SlideShare a Scribd company logo
1 of 163
Skyscraper Security Mgt.Skyscraper Security Mgt. Part IPart I
By, Richard GarrityBy, Richard Garrity
2
Skyscraper Security Mgt.Skyscraper Security Mgt.
Access Control Procedures-Access Control Procedures- Part IPart I
3
High Rise Access ControlHigh Rise Access Control
This presentation is
proprietary information and
can’t be copied or reproduced
in any fashion without consent
from the publisher owner,
Richard Garrity
4
How High Can We Reach?How High Can We Reach?
5
The past reflects on the new…The past reflects on the new…
6
Los Angeles night skylineLos Angeles night skyline
7
Pershing Square, Los Angeles, CA.Pershing Square, Los Angeles, CA.
8
New York City SkylineNew York City Skyline
9
International Place, Boston, MA.International Place, Boston, MA.
10
Atlantic Ave, Boston, MA.Atlantic Ave, Boston, MA.
11
Seattle, Washington skylineSeattle, Washington skyline
12
100 Summer St, Boston, MA.100 Summer St, Boston, MA.
13
TheThe “Superman”“Superman” buildingbuilding
Providence, R.I.Providence, R.I.
14
Hong Kong skyline at nightHong Kong skyline at night
15
High Rise Lobby Operations:High Rise Lobby Operations:
Definitions and Purpose:Definitions and Purpose:
16
High Rise Access ControlHigh Rise Access Control
The purpose of this slide presentationThe purpose of this slide presentation
is to give security professionals a moreis to give security professionals a more
profound meaning and understandingprofound meaning and understanding
to the specifics of high and mid riseto the specifics of high and mid rise
office tower access control.office tower access control.
The information contained herein isThe information contained herein is
proprietary and not to be copy-writtenproprietary and not to be copy-written
in any manor or fashion.in any manor or fashion.
17
High Rise Access ControlHigh Rise Access Control
This presentation looks at theThis presentation looks at the
various measures and bestvarious measures and best
practices for lobby and receptionpractices for lobby and reception
area security, including differentarea security, including different
types of technology and systemstypes of technology and systems
that can aid in access control.that can aid in access control.
However, the core element toHowever, the core element to
access control is the securityaccess control is the security
personnel assigned to protect ourpersonnel assigned to protect our
office buildings.office buildings.
18
This presentation will focus on 7This presentation will focus on 7
primaryprimary operational objectives:operational objectives:
1. Building Class Definitions1. Building Class Definitions
2. Physical Security/ Procedures2. Physical Security/ Procedures
3. General Strategies3. General Strategies
4. Monitoring your lobby & visitors4. Monitoring your lobby & visitors
5. Chain of command5. Chain of command
6.6. Segment from the Sears tower directorSegment from the Sears tower director
7.7. ADA Act-ADA Act- Service Animals GuidelinesService Animals Guidelines
19
Corporate Security:Corporate Security:
A valued industry earningA valued industry earning
more respect everydaymore respect everyday
20
100 Summer Street, Boston:100 Summer Street, Boston:
Your building lobby reflects your commitmentYour building lobby reflects your commitment
to excellence & qualityto excellence & quality
21
Brief History of theBrief History of the
American Office Tower:American Office Tower:
 The Park Street Church in Boston was theThe Park Street Church in Boston was the
tallest building in America from the yearstallest building in America from the years
1810-1846 @ 217 feet.1810-1846 @ 217 feet.
 The first steel framed skyscraper in theThe first steel framed skyscraper in the
United States was the 10 story HomeUnited States was the 10 story Home
Insurance Building- Chicago in 1885.Insurance Building- Chicago in 1885.
 The Twin Towers in New York were builtThe Twin Towers in New York were built
to last 500 years. They lasted just 29 years~to last 500 years. They lasted just 29 years~
22
Building Class Definitions:Building Class Definitions:
23
Building Class Definitions:Building Class Definitions:
For the purposes of comparison,For the purposes of comparison,
office space is grouped intooffice space is grouped into threethree
classesclasses in accordance with one of twoin accordance with one of two
alternative bases:alternative bases: metropolitanmetropolitan andand
international. These classes representinternational. These classes represent
a subjective quality rating of buildingsa subjective quality rating of buildings
which indicates the competitive abilitywhich indicates the competitive ability
of each building to attract similarof each building to attract similar
types of tenants.types of tenants.
24
Building Class Definitions:Building Class Definitions:
Class AClass A
Most prestigious buildingsMost prestigious buildings
competing for premier office userscompeting for premier office users
with rents above average for thewith rents above average for the
area. Buildings have high qualityarea. Buildings have high quality
standard finishes, state of the artstandard finishes, state of the art
systems, exceptional accessibilitysystems, exceptional accessibility
and a definite market presence.and a definite market presence.
25
Building Class Definitions:Building Class Definitions:
Class BClass B
Buildings competing for a wideBuildings competing for a wide
range of users with rents in therange of users with rents in the
average range for the area. Buildingaverage range for the area. Building
finishes are fair to good for the areafinishes are fair to good for the area
and systems are adequate, but theand systems are adequate, but the
building does not compete withbuilding does not compete with
Class A at the same price.Class A at the same price.
26
Building Class Definitions:Building Class Definitions:
Class CClass C
Building owners competing forBuilding owners competing for
tenants requiring functionaltenants requiring functional
office space at rents below theoffice space at rents below the
average for the market area.average for the market area.
*Cite: Data provided by BOMA
27
High Rise VS. Mid RiseHigh Rise VS. Mid Rise
Low Rise-Low Rise- is a building that is only ais a building that is only a
few stories tall.few stories tall.
Mid Rise-Mid Rise- is any building that isis any building that is
generally 8-10 stories tall.generally 8-10 stories tall.
High Rise-High Rise- is any building that isis any building that is
generally 10-14 stories or tallergenerally 10-14 stories or taller
depending on the urban skyline.depending on the urban skyline.
28
The origin ofThe origin of “Skyscraper”“Skyscraper”
The wordThe word "skyscraper""skyscraper" originallyoriginally
was a nautical term referring to awas a nautical term referring to a
small triangular sail set abovesmall triangular sail set above
the skysail on a sailing ship. Thethe skysail on a sailing ship. The
term was first applied toterm was first applied to
buildings of steel framedbuildings of steel framed
construction of at leastconstruction of at least 10 stories10 stories
in the late 19th centuryin the late 19th century
29
Different Levels of Access Control:Different Levels of Access Control:
30
Different Levels of Access Control:Different Levels of Access Control:
Open Access-Open Access- this is an environmentthis is an environment
where employees and visitors can enterwhere employees and visitors can enter
the building without restriction orthe building without restriction or
limitations during normal businesslimitations during normal business
hours. They are free to proceed to theirhours. They are free to proceed to their
destination withoutdestination without challenge or signingchallenge or signing
in nor are they subject to any bagin nor are they subject to any bag
inspections. Although generally, peopleinspections. Although generally, people
entering should always beentering should always be monitored andmonitored and
eye contacteye contact made, even by a simplemade, even by a simple
Hello.Hello.
31
Different Levels of Access Control:Different Levels of Access Control:
Limited Access:Limited Access: this is an environmentthis is an environment
where employees, visitors, etc. can enter awhere employees, visitors, etc. can enter a
building lobby with little restriction duringbuilding lobby with little restriction during
normal business hours. They are free tonormal business hours. They are free to
proceed to their destination, however, theyproceed to their destination, however, they
are first screened by uniformed securityare first screened by uniformed security
personnel as to where they are going.personnel as to where they are going.
Employees/ Visitors are not announced orEmployees/ Visitors are not announced or
required to sign in, or show an ID.required to sign in, or show an ID.
32
Different Levels of Access Control:Different Levels of Access Control:
Security personnel are prettySecurity personnel are pretty
much making a visual screen ofmuch making a visual screen of
the person or persons, thenthe person or persons, then
directing them to theirdirecting them to their
destination. Examples of suchdestination. Examples of such
access procedures are:access procedures are:
The Empire State Building in New YorkThe Empire State Building in New York
and Union Trust Co. in Providence, RIand Union Trust Co. in Providence, RI
33
Different Levels of Access Control:Different Levels of Access Control:
Restricted Access:Restricted Access: this is anthis is an
environment where all employees,environment where all employees,
visitors, vendors, etc must check in withvisitors, vendors, etc must check in with
front desk security/ company personnelfront desk security/ company personnel
to be screened. No one without a validto be screened. No one without a valid
building issued ID will be allowed tobuilding issued ID will be allowed to
proceed past the front desk. Allproceed past the front desk. All
employees who have a valid company IDemployees who have a valid company ID
can either display the badge to an Officercan either display the badge to an Officer
or some lobbies provide some type ofor some lobbies provide some type of
electronic swipe or scan to allow them toelectronic swipe or scan to allow them to
their intended destination.their intended destination.
34
Different Levels of Access Control:Different Levels of Access Control:
Restricted Access:Restricted Access:
Employees who do not have aEmployees who do not have a
valid company ID badge or havevalid company ID badge or have
forgotten such badge, must sign inforgotten such badge, must sign in
with security personnel bywith security personnel by
showing some form of ashowing some form of a
government ID. They may eithergovernment ID. They may either
proceed from there, or they mayproceed from there, or they may
have to be announced & escorted.have to be announced & escorted.
35
Restricted Access Continued:Restricted Access Continued:
Visitors to the building maybeVisitors to the building maybe
subjected to the following: Theysubjected to the following: They
will have to sign in, show a validwill have to sign in, show a valid
state issued ID and be announcedstate issued ID and be announced
to the perspective tenant they areto the perspective tenant they are
visiting. There are various signingvisiting. There are various signing
in procedures, within procedures, with EZ LobbyEZ Lobby
being the most desirable.being the most desirable.
36
Restricted Access Continued:Restricted Access Continued:
AA Visitors badgeVisitors badge should always beshould always be
issued with an expiration date. Someissued with an expiration date. Some
lobby operations may require thatlobby operations may require that
bag inspectionsbag inspections are made but that isare made but that is
extremely rare in the private sector.extremely rare in the private sector.
Usually bag inspections and wandingUsually bag inspections and wanding
are done when entering aare done when entering a local, state,local, state,
or federal building.or federal building.
37
Worker replaces light bulb on top ofWorker replaces light bulb on top of
the eagle-the eagle- Chrysler Building, NYChrysler Building, NY
38
Notre Dame- GargoylesNotre Dame- Gargoyles
watching overwatching over Paris, FranceParis, France
39
Definition: Physical Security:Definition: Physical Security:
40
Definition: Physical Security:Definition: Physical Security:
Physical security describes both
measures that are designed to
deny access to individuals from
physically accessing a facility,
resource, or information stored
on physical media, and guidance
on how to design structures to
resist various hostile acts.
41
Definition: Physical Security:Definition: Physical Security:
It can be as simple as a locked door
or as elaborate as multiple layers of
barriers, armed or unarmed security
officers, and guardhouse
placement. Physical security is not
a modern phenomenon. Physical
security exists in order to deter
persons from entering a facility.
42
Policies and Procedures:Policies and Procedures:
43
Policies and Procedures:Policies and Procedures:
It's really easy toIt's really easy to overlookoverlook lobbieslobbies
andand reception areas when it comes toreception areas when it comes to
designing and implementing andesigning and implementing an
overall security strategy. After all,overall security strategy. After all,
security officials have become sosecurity officials have become so
focused on protecting what's insidefocused on protecting what's inside
and at the core of their facilities, thatand at the core of their facilities, that
they often neglect what's in front ofthey often neglect what's in front of
them..thethem..the entryways.entryways.
44
Policies and Procedures:Policies and Procedures:
Balancing the rightBalancing the right
environment with the rightenvironment with the right
mix ofmix of securitysecurity is definitelyis definitely
not an easy task, but onenot an easy task, but one
that can be mastered.that can be mastered.
45
Policies and Procedures:Policies and Procedures:
As new threats present themselves andAs new threats present themselves and
intruders become craftier, moreintruders become craftier, more proactiveproactive
security measuressecurity measures are necessary to protectare necessary to protect
the front lines of business. It can no longer bethe front lines of business. It can no longer be
assumed that security is somethingassumed that security is something
implemented once and then forgotten — orimplemented once and then forgotten — or
that it is solely the responsibility of onethat it is solely the responsibility of one
department. Building personnel and the highdepartment. Building personnel and the high
rise office towers we protect, are dependentrise office towers we protect, are dependent
on ouron our competencecompetence,, trainingtraining,, diligencediligence,,
alertnessalertness,, and most importantly, ourand most importantly, our
dedicateddedicated commitment to insure we cancommitment to insure we can
safeguard the lobby and premises the bestsafeguard the lobby and premises the best
that we can.that we can.
46
Policies and Procedures:Policies and Procedures:
We are in a whole new age, aWe are in a whole new age, a
new world, where thenew world, where the corporatecorporate
security officersecurity officer is expected tois expected to
know building systems, complexknow building systems, complex
procedures, and knowledge ofprocedures, and knowledge of
certain operating procedurescertain operating procedures
thatthat 20 years ago20 years ago were un-were un-
applicable and unimaginable.applicable and unimaginable.
47
Policies and Procedures:Policies and Procedures:
Defining and implementingDefining and implementing policiespolicies
and proceduresand procedures that are tailoredthat are tailored
specifically to your securityspecifically to your security
environment can go a long way inenvironment can go a long way in
keeping lobbies and reception areaskeeping lobbies and reception areas
secure. Here are somesecure. Here are some generalgeneral
strategiesstrategies that can help shape thethat can help shape the
future and effectiveness of yourfuture and effectiveness of your
building security program.building security program.
48
General Strategies:General Strategies:
49
Developing a comprehensive security trainingDeveloping a comprehensive security training
program for all employees is one of the mostprogram for all employees is one of the most
important security measures an organizationimportant security measures an organization
can deploy. The training is especially critical forcan deploy. The training is especially critical for
front-line staff, such asfront-line staff, such as security officerssecurity officers andand
receptionistsreceptionists,, so they have a sophisticatedso they have a sophisticated
understanding of the potential risks andunderstanding of the potential risks and
vulnerabilities associated with their work areas,vulnerabilities associated with their work areas,
and know properand know proper emergency procedures.emergency procedures.
* General strategies segment extracted from South Station “JAM”* General strategies segment extracted from South Station “JAM”
presentation on March 15presentation on March 15thth
, 2006- by Richard Garrity, 2006- by Richard Garrity
Provide proper Training:Provide proper Training:
50
High Rise Access ControlHigh Rise Access Control
Restrict the flow ofRestrict the flow of
pedestrian traffic into a facility:pedestrian traffic into a facility:
Even something as simple as a turnstile, aEven something as simple as a turnstile, a
type of gate that allows only one person totype of gate that allows only one person to
pass per rotation — can help significantly topass per rotation — can help significantly to
manage the flowmanage the flow of traffic into a facility.of traffic into a facility.
Another way to restrict the flow of traffic is toAnother way to restrict the flow of traffic is to
limit access to the facility with only one or twolimit access to the facility with only one or two
entry points that can be closely monitored.entry points that can be closely monitored.
However, keep in mind obviously, that theseHowever, keep in mind obviously, that these
options may not be financially or aestheticallyoptions may not be financially or aesthetically
feasible in any one given environment or anyfeasible in any one given environment or any
particular buildingparticular building..
51
General Strategies:General Strategies:
But, a hands on proactiveBut, a hands on proactive securitysecurity
managermanager should always introduce, asshould always introduce, as
suggestions and alternatives, thesesuggestions and alternatives, these
devices during quarterly and or yearlydevices during quarterly and or yearly
security operation reviews. In addition, thesecurity operation reviews. In addition, the
proactive front line security officer canproactive front line security officer can
always provide some of the best accessalways provide some of the best access
control suggestions and or updatescontrol suggestions and or updates
because they are there everyday andbecause they are there everyday and
observe what areobserve what are strengthsstrengths andand
weaknessesweaknesses in the building lobby accessin the building lobby access
procedures.procedures.
52
General Strategies:General Strategies:
Enforce that visitorsEnforce that visitors
wear Visitor badges:wear Visitor badges:
A badge offers temporary identification andA badge offers temporary identification and
may include, for example, the visitor's name,may include, for example, the visitor's name,
date, time and the person they are seeing. Theydate, time and the person they are seeing. They
can either be low-tech (handwritten stickycan either be low-tech (handwritten sticky
badges) or high-tech (a professional print-outbadges) or high-tech (a professional print-out
with color photo). The most effective thus farwith color photo). The most effective thus far
has been devices likehas been devices like EZ LobbyEZ Lobby that canthat can
document and track a Visitor’s arrival,document and track a Visitor’s arrival,
destination, and departure.destination, and departure.
53
General Strategies:General Strategies:
Ensure visitors are not left alone:Ensure visitors are not left alone:
It may not be possible to be at a visitor'sIt may not be possible to be at a visitor's
side at all times, but, when possible,side at all times, but, when possible,
guests should not be left alone unless theyguests should not be left alone unless they
have beenhave been properly clearedproperly cleared by the tenantby the tenant
contact or have been greeted by the tenantcontact or have been greeted by the tenant
contact andcontact and escortedescorted to the confirmedto the confirmed
floor, space, and destination. Not only isfloor, space, and destination. Not only is
this a polite gesture, it is also a proactivethis a polite gesture, it is also a proactive
security measure.security measure.
54
Access Control PrioritiesAccess Control Priorities
55
Access Control Priority 1Access Control Priority 1
Priority number 1Priority number 1 in any restrictedin any restricted
or even limited access controlor even limited access control
environment is thatenvironment is that no oneno one …… no oneno one
enters the facility without showing aenters the facility without showing a
valid activated company / tenant ID.valid activated company / tenant ID.
No visitor or contractor shall ever beNo visitor or contractor shall ever be
able to circumvent your access controlable to circumvent your access control
procedures, ever!procedures, ever!
56
Access Control Priority 2Access Control Priority 2
Priority number 2Priority number 2 in any restricted orin any restricted or
even limited access control environment is thateven limited access control environment is that
any employee who forgets or has lost their IDany employee who forgets or has lost their ID
shall not be permitted access orshall not be permitted access or “waived”“waived” in.in.
They must sign-in and be approved by saidThey must sign-in and be approved by said
Supervisor. No matter how well you maybeSupervisor. No matter how well you maybe
acquainted with any given employee, they veryacquainted with any given employee, they very
well could have beenwell could have been terminatedterminated the previousthe previous
day or even the present day without yourday or even the present day without your
knowledge.knowledge.
57
Incident- Case Spotlight:Incident- Case Spotlight:
On December 14On December 14thth
, 2008, 2008 in Britishin British
Columbia, a man named Eric AllenColumbia, a man named Eric Allen
Kirkpatrick shot and killed his former BossKirkpatrick shot and killed his former Boss
CEO David BankyCEO David Banky of Tallgrass Distribution
at their annual Christmas Party. Kirkpatrick
was fired the day before and un-invited.
Kirkpatrick was able to gain access as lobby
security was used to seeing him everyday
and let him thru without an ID verification.
(Waved thru).
58
Incident- Case Spotlight:Incident- Case Spotlight:
The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident
This access oversight very well may have
cost Mr. Banky his life. However, several
critical notations to this episode must be
addressed. Human Resources for this
company had failed to properly notify
Security officials of Kirkpatrick’s
termination in a timely manor. There was
no “Pass On” memo.
59
Incident- Case Spotlight:Incident- Case Spotlight:
The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident
Regardless, if the desk officer
had followed procedure and
contacted Kirpatrick’s supervisor
for access approval, then Security
would have been advised that
said individual was terminated
the day before.
60
Incident- Case Spotlight:Incident- Case Spotlight:
The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident
That may have not have prevented direct
violence by Kirpatrick either there at the lobby
area (after denial was communicated) or somewhere
else within the building, but it would have given
security personnel critical time to call 911 and to
significantly reduce the potential casualties to
employees. It is also possible that after said
denial was given, that he could have left the
premises without incident.
61
Employee Identification:Employee Identification:
62
Properly checkingProperly checking employeeemployee
ID’sID’s and processing otherand processing other
identification fromidentification from visitorsvisitors isis
one of the mostone of the most criticalcritical dutiesduties
a corporate security officera corporate security officer
engages in everyday.engages in everyday.
Employee Identification:Employee Identification:
63
““Rejected Access”Rejected Access” Card Alerts:Card Alerts:
64
If a building access card isIf a building access card is
coming up ascoming up as “rejected”“rejected” onon
youryour facility access controlfacility access control
screen (C-Cure 800, Spectrumscreen (C-Cure 800, Spectrum
software, etc.)software, etc.) DO NOT ignoreDO NOT ignore
it,it, investigate it.investigate it.
““Rejected Access”Rejected Access” Card Alerts:Card Alerts:
65
Are there after-hoursAre there after-hours weakweak entry pointsentry points
that could compromise yourthat could compromise your building?building?
Your tenants?Your tenants?
66
High Rise Access Control-High Rise Access Control-
Monitoring yourMonitoring your Lobby / VisitorsLobby / Visitors
67
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
The primary concern is the securityThe primary concern is the security
personnel who take their eyes off thepersonnel who take their eyes off the
visitor orvisitor or non clearednon cleared entrants, andentrants, and
loose trackloose track of them. This is whereof them. This is where
safety, liability, and service qualitysafety, liability, and service quality
concerns originate. When all is saidconcerns originate. When all is said
and done, professional sharp accessand done, professional sharp access
control team members are one of thecontrol team members are one of the
top priorities we focus on.top priorities we focus on.
68
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
In the grand scheme of things,In the grand scheme of things,
when we are taking legitimatewhen we are taking legitimate
business calls or assisting a personbusiness calls or assisting a person
with directions, or transmitting onwith directions, or transmitting on
the Nextel to Engineering, nothingthe Nextel to Engineering, nothing
should have yourshould have your attentionattention more,more,
than the flow of traffic into yourthan the flow of traffic into your
building. Equally vital is the diligentbuilding. Equally vital is the diligent
tracking of alltracking of all visitors and vendorsvisitors and vendors
who are awaiting processing at anywho are awaiting processing at any
givengiven security checkpoint.security checkpoint.
69
Your eyes should not be taken off theYour eyes should not be taken off the
general view of the lobby perimeter, notgeneral view of the lobby perimeter, not
for evenfor even 1 second1 second.. Whatever you areWhatever you are
doing, whoever you are with, you shoulddoing, whoever you are with, you should
be at ALL times, tracking your lobbybe at ALL times, tracking your lobby
perimeter and the individuals enteringperimeter and the individuals entering
them. This of course also pertains to thethem. This of course also pertains to the
scanning or displaying of employeescanning or displaying of employee
work ID’s and any other acceptablework ID’s and any other acceptable
Identification currently cleared by yourIdentification currently cleared by your
Property Management Team.Property Management Team.
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
70
These access control protocols are fairlyThese access control protocols are fairly
standard throughout the building securitystandard throughout the building security
industry. However, we must also address theindustry. However, we must also address the
current state of physical electronic accesscurrent state of physical electronic access
control security measures introduced to highcontrol security measures introduced to high
rise buildings in the last 10 years or so. Withrise buildings in the last 10 years or so. With
the introduction of fast lane type glassthe introduction of fast lane type glass
barriers and turn-styles, lobby securitybarriers and turn-styles, lobby security
personnel are not required to be as acutelypersonnel are not required to be as acutely
alert as they would normally be with thealert as they would normally be with the
traditionaltraditional “show and pass”“show and pass” identificationidentification
methods of the past.methods of the past. Let me explain…Let me explain…
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
71
There are several methods of employeesThere are several methods of employees
entering a building and gaining access.entering a building and gaining access.
They are:They are:
1.1. Displaying an ID to the desk officer andDisplaying an ID to the desk officer and
proceeding to their floor destination.proceeding to their floor destination.
2. Displaying an ID and or scanning it in a2. Displaying an ID and or scanning it in a
stationary reader, waiting for a beepstationary reader, waiting for a beep
approval (usually aapproval (usually a green lightgreen light) and) and
proceeding to their floor destination. Aproceeding to their floor destination. A
red lightred light usually means a rejected card,usually means a rejected card,
where upon the lobby personnel willwhere upon the lobby personnel will
motion the person to stop so the cardmotion the person to stop so the card
and or status can be examined.and or status can be examined.
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
72
3. Swiping your employee ID into a3. Swiping your employee ID into a
scanner or reader that activatesscanner or reader that activates
access approval from the fast laneaccess approval from the fast lane
typetype glass barriers,glass barriers, thus pretty muchthus pretty much
by-passing security lobby personnelby-passing security lobby personnel
or interaction to achieve saidor interaction to achieve said
approval.approval.
4. Executing the same access procedure4. Executing the same access procedure
except for the use of theexcept for the use of the turn-styleturn-style
type access barriers.type access barriers.
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
73
5. Gaining access into a facility5. Gaining access into a facility
usingusing bio-metrics-bio-metrics- the eye-the eye-
retinal scan or pressing yourretinal scan or pressing your
thumb into a reader to verifythumb into a reader to verify
your on-file fingerprint. This isyour on-file fingerprint. This is
especially rare in the privateespecially rare in the private
sector and more common insector and more common in
federal type facilities.federal type facilities.
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
74
ToTo re-cap,re-cap, we should stress thatwe should stress that
lobby security personnel shouldlobby security personnel should
be keenly alert of their lobbybe keenly alert of their lobby
perimeter and flow of people atperimeter and flow of people at
all times. However, with the useall times. However, with the use
of the glass barriers & turn-of the glass barriers & turn-
styles, it makes the job a wholestyles, it makes the job a whole
lot morelot more manageablemanageable and betterand better
toto control.control.
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
75
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
Individuals,Individuals, who fail towho fail to
comply with your accesscomply with your access
control policies, should becontrol policies, should be
asked to leave the premisesasked to leave the premises
politely. Do not engage inpolitely. Do not engage in
heatedheated disagreementdisagreement oror
argumentargument. That approach is. That approach is
not recommended, and isnot recommended, and is
prohibited.prohibited.
76
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
““If several attempts to have theIf several attempts to have the
individual leave are not realized,individual leave are not realized,
you should contact youryou should contact your shiftshift
supervisorsupervisor and orand or security managersecurity manager
for assistance. They will thenfor assistance. They will then
determine if thedetermine if the PolicePolice should beshould be
summoned to remove such personsummoned to remove such person
who has no clear, legitimatewho has no clear, legitimate
business in the facility.”business in the facility.”
77
Those access control moments:Those access control moments:
78
Those access control moments:Those access control moments:
If during the course of your accessIf during the course of your access
control duties, you come across ancontrol duties, you come across an
individual who does not have theirindividual who does not have their
employee ID but starts with theemployee ID but starts with the “Do you“Do you
know who I am”know who I am” salty routine, then firmly,salty routine, then firmly,
but politely explain that yes they maybebut politely explain that yes they maybe
someone important, but the buildingsomeone important, but the building
access control policies apply to ALLaccess control policies apply to ALL
building occupants. If they demand tobuilding occupants. If they demand to
“speak”“speak” with your supervisor, absolutely,with your supervisor, absolutely,
let them.let them.
79
Those access control moments:Those access control moments:
What do I do if an anxiousWhat do I do if an anxious
employee states they have lost oremployee states they have lost or
forgotten their company ID andforgotten their company ID and
we can’twe can’t contactcontact their directtheir direct
supervisor for approval? Do wesupervisor for approval? Do we
tell them to wait? Come backtell them to wait? Come back
some other time?some other time?
80
Those access control moments:Those access control moments:
Absolutely not.Absolutely not. Although we are supposeAlthough we are suppose
to engage in strict access controlto engage in strict access control
protocols, we are also expected to deliverprotocols, we are also expected to deliver
exemplary customer service to all. Theexemplary customer service to all. The
remedy to this particular dilemma wouldremedy to this particular dilemma would
be if you can’t contact an appropriatebe if you can’t contact an appropriate
representative from the employee’srepresentative from the employee’s
company to approve access, then takecompany to approve access, then take
other alternative measures so that theother alternative measures so that the
employee can be processed efficiently.employee can be processed efficiently.
81
Those access control moments:Those access control moments:
Examples to remedy the situation:Examples to remedy the situation:
1. Contact another security officer or1. Contact another security officer or
supervisor andsupervisor and escortescort the employeethe employee
to their floor, then find an authorizedto their floor, then find an authorized
individual who willindividual who will grantgrant access andaccess and
take over from there. During thistake over from there. During this
escort phase, the employee can’tescort phase, the employee can’t
leave your presence until saidleave your presence until said
access has been granted.access has been granted.
82
Those access control moments:Those access control moments:
Examples to remedy the situation:Examples to remedy the situation:
2. If you can’t contact the employee’s2. If you can’t contact the employee’s
direct supervisor or manager, and andirect supervisor or manager, and an
escort is not available at thatescort is not available at that
moment, then contact the companymoment, then contact the company
receptionist, explain the situationreceptionist, explain the situation
and request if someone who isand request if someone who is
authorized within the company canauthorized within the company can
come down and escort the employee.come down and escort the employee.
83
Those access control moments:Those access control moments:
3. If both of these measures have3. If both of these measures have
not producednot produced the desired result,the desired result,
then simply contact your security orthen simply contact your security or
property manager and explain theproperty manager and explain the
circumstances, this is especiallycircumstances, this is especially
important if the employee is late forimportant if the employee is late for
work, late for a meeting, orwork, late for a meeting, or
extremelyextremely agitated & verbal.agitated & verbal.
84
Just who is in your lobby?Just who is in your lobby?
85
Just who is in your lobby?Just who is in your lobby?
The very essence ofThe very essence of access controlaccess control
starts the moment someone, anyone,starts the moment someone, anyone,
entersenters your building. Enters youryour building. Enters your
lobby. Even if they do not attempt tolobby. Even if they do not attempt to
gain access, who are they? What isgain access, who are they? What is
their purpose? Never jump totheir purpose? Never jump to
conclusions or assume, but alwaysconclusions or assume, but always
watch and learnwatch and learn your surroundings.your surroundings.
86
The Access Control Motto:The Access Control Motto:
“NO ID…No Entrance”“NO ID…No Entrance”
87
Your client buildingYour client building
Management Team:Management Team:
88
Your client building Mgt. Team:Your client building Mgt. Team:
Site Critical Directive:Site Critical Directive:
Never hesitate to reach out to anyNever hesitate to reach out to any
member of yourmember of your Property Mgt.Property Mgt. TeamTeam
for questions you don’t have thefor questions you don’t have the
answer to. They know the buildinganswer to. They know the building
operations better than anyone andoperations better than anyone and
can give you proper guidance whencan give you proper guidance when
your immediate supervisor may notyour immediate supervisor may not
be available.be available.
89
Unauthorized building entries:Unauthorized building entries:
90
High Rise Access ControlHigh Rise Access Control
Priority number 3Priority number 3--
In the event that anIn the event that an
unauthorizedunauthorized person shouldperson should
slip by your post, refuses toslip by your post, refuses to
show an ID, or ignores yourshow an ID, or ignores your
demands todemands to STOPSTOP, do the, do the
following actions & maintainfollowing actions & maintain
radio contact:radio contact:
91
High Rise Access ControlHigh Rise Access Control
NEVERNEVER place your hands on the subject to stopplace your hands on the subject to stop
them. Make loud and consistent verbalthem. Make loud and consistent verbal
commands for the subject tocommands for the subject to STOPSTOP while at thewhile at the
same time repeatedly stating the access policy.same time repeatedly stating the access policy.
Always try to step in front of the trespasser andAlways try to step in front of the trespasser and
block further access, but do not make anyblock further access, but do not make any
physical contact. During this time calls forphysical contact. During this time calls for backback
upup should be made and ifshould be made and if Police notificationPolice notification isis
necessary, dialnecessary, dial 911911 and report the situation.and report the situation.
Never lose sight of subject or his/her location.Never lose sight of subject or his/her location.
92
High Rise Access ControlHigh Rise Access Control
This general interdiction policy if anThis general interdiction policy if an
intruder breaches your lobby perimeterintruder breaches your lobby perimeter
applies also in the event that you catchapplies also in the event that you catch
someonesomeone breaking intobreaking into your building oryour building or
is in the process of attempting to breakis in the process of attempting to break
into your facility.into your facility. “Confront”“Confront” from afrom a
distance when it is clear to you that thedistance when it is clear to you that the
person you have encountered clearly isperson you have encountered clearly is
not authorized to be there.not authorized to be there.
93
High Rise Access ControlHigh Rise Access Control
Maintain constantMaintain constant radioradio
contact, follow from acontact, follow from a
distance, and try and get asdistance, and try and get as
much of a physicalmuch of a physical
description of the perpetrator.description of the perpetrator.
Safety Safety SafetySafety Safety Safety is youris your
foremost concern.foremost concern.
94
High Rise Access ControlHigh Rise Access Control
More in depth instructions onMore in depth instructions on
how to deal withhow to deal with unauthorizedunauthorized
building intrusions and use ofbuilding intrusions and use of
force procedures will be coveredforce procedures will be covered
in the Legal Authority/ Uniformin the Legal Authority/ Uniform
Protocol training module.Protocol training module.
95
Is your lobby area well observed?Is your lobby area well observed?
What is wrong with this lobby?What is wrong with this lobby?
96
1. There is an individual shooting or filming1. There is an individual shooting or filming
the lobby- far left.the lobby- far left.
2.2. There is an individual clearly takenThere is an individual clearly taken
photographs- next to the down escalatorsphotographs- next to the down escalators
3. There is no Mgt. presence in the lobby to3. There is no Mgt. presence in the lobby to
question or cease such activity.question or cease such activity.
4.4. There is no Security personnel at the frontThere is no Security personnel at the front
desk or visible in the lobby.desk or visible in the lobby.
Is your lobby area well observed?Is your lobby area well observed?
97
Image Reproduction:Image Reproduction:
98
Absolutely noAbsolutely no image reproductionimage reproduction either byeither by
devices like cameras, cell phones, or videodevices like cameras, cell phones, or video
cameras are made of your lobby/interiorcameras are made of your lobby/interior
premises unless approved bypremises unless approved by PropertyProperty
Management.Management. Image reproduction of yourImage reproduction of your
exteriorexterior building and grounds should bebuilding and grounds should be
strongly discouraged, but legally we can notstrongly discouraged, but legally we can not
STOPSTOP someone from photographing thesomeone from photographing the
exterior premises.exterior premises.
High Rise Access Control-High Rise Access Control-
99
Legal Restraining Orders:Legal Restraining Orders:
100
Security personnel must beSecurity personnel must be
cognizant of employees that havecognizant of employees that have
activeactive “restraining orders”.“restraining orders”. AlwaysAlways
check for updates, status, and thecheck for updates, status, and the
picture of the person who has thepicture of the person who has the
restraining order taken out againstrestraining order taken out against
them. These critical updates must bethem. These critical updates must be
easily accessible so that staff caneasily accessible so that staff can
review such documents.review such documents.
Restraining Orders:Restraining Orders:
101
They also must be kept well within theThey also must be kept well within the
scope of your eyes only and not thescope of your eyes only and not the
public’s. These types of sensitive legalpublic’s. These types of sensitive legal
orders areorders are private and confidentialprivate and confidential,,
therefore they should never betherefore they should never be POSTEDPOSTED
in an area that could be viewed by nonin an area that could be viewed by non
security or non management personnel.security or non management personnel.
It is equally vital that these legalIt is equally vital that these legal
notices arenotices are destroyeddestroyed once it isonce it is
conveyed to you that the action hasconveyed to you that the action has
closed.closed.
Restraining Orders:Restraining Orders:
102
Chain of Command section:Chain of Command section:
103
A command hierarchy (chain of
command) is a group of people
dedicated to carrying out orders
"from the top", that is, of authority. It
is part of a power structure. A chain
of command is vital to maintaining
communication and discipline within
the ranks.
Chain of CommandChain of Command
104
In general,In general, security supervisorssecurity supervisors andand securitysecurity
managersmanagers give orders only to those directlygive orders only to those directly
below them in the chain of command andbelow them in the chain of command and
receive orders only from those directly abovereceive orders only from those directly above
them. A security officer who has difficultythem. A security officer who has difficulty
executing a duty or order and appeals forexecuting a duty or order and appeals for
relief directly above his immediaterelief directly above his immediate
supervisor/ manager in the chain ofsupervisor/ manager in the chain of
command is likely to be disciplined and orcommand is likely to be disciplined and or
written up for not observing the chain ofwritten up for not observing the chain of
command structure.command structure.
Chain of CommandChain of Command
105
Security personnel who have a direct
supervisor should report only to that
individual and only that individual on all
matters relevantrelevant to the operational
objectives of your security program. Staff
personnel who feel they are have been
wronged and see no immediate remedy to
the problem are welcome to then go
further up the chain to solve the issue.
Chain of CommandChain of Command
106
Although there is an established chain of
command just about anywhere you go in the
working world, that does not mean that front
line personnel can’t have some type of
reasonable communication with upper
management that is above your direct
supervisor. Communication with all levels of
the power structure are actually strongly
encouraged.
Chain of CommandChain of Command
107
It is disagreements and the complaint
process that becomes the problem when
subordinates do not adhere to the chain
of command and respect their
supervisors. The key word here being,
respect. If a supervisor has made what
appears to be a correct decision or is
reasonably enforcing any particular rule
or procedure, then you do not-
Chain of CommandChain of Command
108
-have the right to start going to all kinds
of people above that supervisor and
making waves about something you
have no clear standing on. Basically, if
you “don’t get your way” on any given
issue and you think going way above
your supervisor or manager is the
solution, then your sorely mistaken and
you will be disciplined for your conduct.
Chain of CommandChain of Command
109
Chain of CommandChain of Command
The “Client”The “Client”
110
“If I don’t get my way, I will just run to the
client and complain to them. They like
me, I have been here for years. I will
show them!”….That method may work
temporarily, but in the long term your
setting yourself up for termination.
Absolutely under no circumstances will
any security personnel circumvent the
chain of command and go to the client.
Chain of CommandChain of Command
111
Certain select management team
members in contract security
communicate directly with the client
team at your facility regarding
operational issues, objectives, planning,
procedures, and staff concerns. Those
officials consist of the account manager,
assistant account manager, the district
manager, and or branch mgr.
Chain of CommandChain of Command
112
Do we in management expect you to
effectively communicate with your client
team members and maintain a healthy
working relationship? Yes of course we
do!! It is matters of disagreement or
tension among the ranks that can not be
exposed to any client team member.
They do not get involved in internal
matters.
Chain of CommandChain of Command
113
If you choose to continually ignore the
chain of command or you have a habit of
running to the client on matters that are
meant to be handled by your direct
supervisors, then you will be purged
from the employee roster. Put simply,
you will be terminated and we always
want to avoid that scenario~
114
Access control perspective from theAccess control perspective from the
Sears Tower Security Director:Sears Tower Security Director:
115
Excerpts from the May 2007Excerpts from the May 2007
edition ofedition of Security ManagementSecurity Management
116
Excerpts from theExcerpts from the May 2007May 2007
edition ofedition of Security ManagementSecurity Management
Chicago’s Sears Tower,Chicago’s Sears Tower, at a height ofat a height of
1,454 feet1,454 feet to its architectural top, is theto its architectural top, is the
tallest building in the United States and atallest building in the United States and a
leading symbol of U.S. commerce. Afterleading symbol of U.S. commerce. After
the collapse of the World Trade Center,the collapse of the World Trade Center,
the former management was concernedthe former management was concerned
about the Sears Tower’s prominence as aabout the Sears Tower’s prominence as a
terrorist target andterrorist target and hardenedhardened securitysecurity
accordingly.accordingly.
117
Excerpts from theExcerpts from the May 2007May 2007
edition ofedition of Security ManagementSecurity Management
However, tenants were unhappy. SixHowever, tenants were unhappy. Six
years out fromyears out from 9-119-11, the building, which, the building, which
is under new ownership, hasis under new ownership, has
considerably revamped the securityconsiderably revamped the security
program it inherited to create a robustlyprogram it inherited to create a robustly
secure but subtlesecure but subtle environment thatenvironment that
does not make tenants feel like theydoes not make tenants feel like they
work in a fortress.work in a fortress.
118
Excerpts from theExcerpts from the May 2007May 2007
edition ofedition of Security ManagementSecurity Management
““When Sears Tower Management Group tookWhen Sears Tower Management Group took
over…[the goal was to] strike the balanceover…[the goal was to] strike the balance
between goodbetween good customer servicecustomer service andand greatgreat
securitysecurity,”,” says Sears Tower Managementsays Sears Tower Management
Director of Security and Life SafetyDirector of Security and Life Safety Keith L.Keith L.
KambicKambic, CPP., CPP.
Kambic elaborates : “A high rise is a businessKambic elaborates : “A high rise is a business
entity, and we can protect it all we want, but if weentity, and we can protect it all we want, but if we
don’t get new tenants in here, then it’s an emptydon’t get new tenants in here, then it’s an empty
building. It really does us no good.”building. It really does us no good.”
119
Excerpts from theExcerpts from the May 2007May 2007
edition ofedition of Security ManagementSecurity Management
When Kambic joined the Sears Tower securityWhen Kambic joined the Sears Tower security
team in 2004, he says, it was still responding toteam in 2004, he says, it was still responding to
the 2001 attacks withthe 2001 attacks with “the hard approach”,“the hard approach”, thethe
approach that occurred for most buildings rightapproach that occurred for most buildings right
after 9-11. The security officers were in hardafter 9-11. The security officers were in hard
uniforms that mimicked Chicago police;uniforms that mimicked Chicago police;
customer servicecustomer service was not a priority; and thewas not a priority; and the
fronts of our lobbies were filled with x-ray andfronts of our lobbies were filled with x-ray and
metal detection machines. So as soon as youmetal detection machines. So as soon as you
walked in, that was the first thing that you saw.”walked in, that was the first thing that you saw.”
120
““Striking the balance”Striking the balance”
Now, however, security’s approach isNow, however, security’s approach is
moremore subtlesubtle.. There’s a package-screeningThere’s a package-screening
machine off to one side of the lobby, butmachine off to one side of the lobby, but
there is no lengthy queue behind it.there is no lengthy queue behind it.
Employees flow in unimpeded; visitorsEmployees flow in unimpeded; visitors
pass quickly through a metal detectorpass quickly through a metal detector
before using access control cards at abefore using access control cards at a
series of decorative turnstiles to reach theseries of decorative turnstiles to reach the
elevators.elevators. VisitorsVisitors are able to check in at aare able to check in at a
reception desk staffed by customerreception desk staffed by customer
service agents inservice agents in business-style uniforms.business-style uniforms.
121
““Striking the balance”Striking the balance”
Training.Training. The state of Illinois requires thatThe state of Illinois requires that
security officers have 20 hours of training beforesecurity officers have 20 hours of training before
coming on site; Kambic requires an additional 16coming on site; Kambic requires an additional 16
hours. Once on the job, security staff participatehours. Once on the job, security staff participate
in a formalized and documentedin a formalized and documented trainingtraining
programprogram tailored by Kambic and the securitytailored by Kambic and the security
contractor specifically for the Sears Tower site.contractor specifically for the Sears Tower site.
In addition, they receive training from severalIn addition, they receive training from several
agencies, including the FBI; the Secret Service;agencies, including the FBI; the Secret Service;
the Bureau of Alcohol, Tobacco, Firearms, andthe Bureau of Alcohol, Tobacco, Firearms, and
Explosives; and the Chicago Police and FireExplosives; and the Chicago Police and Fire
Departments.Departments.
122
Customer Service aspects:Customer Service aspects:
One module of the officer training is aOne module of the officer training is a
thorough grounding inthorough grounding in customer servicecustomer service..
“In high rises, service is your biggest“In high rises, service is your biggest
amenity. That’s one of the reasons thatamenity. That’s one of the reasons that
they choose your building.”they choose your building.”
This idea is reflected in the change fromThis idea is reflected in the change from
police-type uniforms to morepolice-type uniforms to more corporatecorporate
uniform attireuniform attire..
123
Customer Service aspects:Customer Service aspects:
The new look for officers includes navy-The new look for officers includes navy-
blue suits, shirts, and silk ties. On the firstblue suits, shirts, and silk ties. On the first
day the officers wore their new uniforms,day the officers wore their new uniforms,
KambicKambic recalls, favorable tenantrecalls, favorable tenant
comments rolled in. “It’s more than just acomments rolled in. “It’s more than just a
look. And I think the officerslook. And I think the officers felt betterfelt better
about themselves; they feltabout themselves; they felt moremore
professionalprofessional.”.”
124
Customer Service aspects:Customer Service aspects:
Previously, says Kambic, officers rarelyPreviously, says Kambic, officers rarely greetedgreeted
tenants and guests. “Now we want our officerstenants and guests. “Now we want our officers
to make eye-contact, give a nod or a smile—to make eye-contact, give a nod or a smile—
something so that thesomething so that the tenant feels recognizedtenant feels recognized.”.”
Ideally, a tenant or visitor could have contactIdeally, a tenant or visitor could have contact
with securitywith security three timesthree times before they reach thebefore they reach the
elevator bank.elevator bank.
““The bottom line is that, in a high rise, securityThe bottom line is that, in a high rise, security
staff provide thestaff provide the first impressionfirst impression when peoplewhen people
walk in and thewalk in and the last impressionlast impression when peoplewhen people
walk out,” Kambic states.walk out,” Kambic states.
125
ADA Act of 1990- 2010 UpdateADA Act of 1990- 2010 Update
126
2010 Update- Service Animals2010 Update- Service Animals
127
2010 Update- Service Animals2010 Update- Service Animals
As professional and corporate securityAs professional and corporate security
personnel, it is prudent that your fullypersonnel, it is prudent that your fully
knowledgeable on building regulationsknowledgeable on building regulations
concerning the entry and denying entry ofconcerning the entry and denying entry of
individuals who have service animals. It isindividuals who have service animals. It is
equally important to know what questionsequally important to know what questions
can be asked and what can not be askedcan be asked and what can not be asked
of individuals when they enter your lobbyof individuals when they enter your lobby
with a service animal.with a service animal.
128
2010 Update- Service Animals2010 Update- Service Animals
Federal ADA (Americans w/ DisabilitiesFederal ADA (Americans w/ Disabilities
Act) Service Animals- The specifics:Act) Service Animals- The specifics:
129
2010 Update- Service Animals2010 Update- Service Animals
TheThe Department of JusticeDepartment of Justice publishedpublished
revised final regulations implementing therevised final regulations implementing the
Americans with Disabilities ActAmericans with Disabilities Act (ADA) for(ADA) for
title II (State and local governmenttitle II (State and local government
services) and title III (publicservices) and title III (public
accommodations and commercialaccommodations and commercial
facilities) on September 15, 2010, in thefacilities) on September 15, 2010, in the
Federal Register. These requirements, orFederal Register. These requirements, or
rules, clarify and refine issues that haverules, clarify and refine issues that have
arisen over the pastarisen over the past 20 years20 years and containand contain
new, and updated requirements.new, and updated requirements.
130
2010 Update- Service Animals2010 Update- Service Animals
1. Beginning on March 15, 2011, only
dogs are recognized as service animals
under titles II and III of the ADA.
2. A service animal is a dog that is
individually trained to do work or perform
tasks for a person with a disability.
3. Generally speaking, title II and title III
entities must permit service animals to
accompany people with disabilities in all
areas where members of the public are
allowed to go.
131
Service Animals Defined:Service Animals Defined:
Service animals are defined as dogs that are
individually trained to do work or perform tasks for
people with disabilities. Examples of such work or tasks
include guiding people who are blind, alerting people who
are deaf, pulling a wheelchair, alerting and protecting a
person who is having a seizure, reminding a person with
mental illness to take prescribed medications, calming a
person with Post Traumatic Stress Disorder (PTSD) during
an anxiety attack, or performing other duties. Service
animals are working animals, not pets. The work or task a
dog has been trained to provide must be directly related to
the person’s disability. Dogs whose sole function is to
provide comfort or emotional support do not qualify as
service animals under the ADA.
132
Service Animals Defined:Service Animals Defined:
This definition does not affect or limit the
broader definition of “assistance animal”
under the Fair Housing Act or the
broader definition of “service animal”
under the Air Carrier Access Act.
Some State and local laws also define
service animal more broadly than the
ADA does. Information about such laws
can be obtained from the origin State
attorney general’s office.
133
Service Animals Defined:Service Animals Defined:
Under the ADA, State and local
governments, businesses, and
nonprofit organizations that serve
the public generally must allow
service animals to accompany
people with disabilities in all areas
of the facility where the public is
normally allowed to go.
134
Service Animals Defined:Service Animals Defined:
For example, in a hospital it would
be inappropriate to exclude a
service animal from areas such as
patient rooms, clinics, cafeterias, or
examination rooms. However, it may
be appropriate to exclude a service
animal from operating rooms or
burn units where the animal’s
presence may compromise a sterile
environment.
135
Service Animals- Control:Service Animals- Control:
Under the ADA, service animals must be
harnessed, leashed, or tethered, unless
these devices interfere with the service
animal’s work or the individual’s
disability prevents using these devices.
In that case, the individual must maintain
control of the animal through voice,
signal, or other effective controls.
136
Asking Questions. Be careful.Asking Questions. Be careful.
137
Service Animals- Questions:Service Animals- Questions:
When it is not obvious what
service an animal provides,
only limited inquiries are
allowed. Staff may ask two
questions: (1) is the dog a
service animal required
because of a disability.
138
Service Animals- Questions:Service Animals- Questions:
(2) what work or task has the dog
been trained to perform. Staff cannot
ask about the person’s disability,
require medical documentation,
require a special identification card
or training documentation for the
dog, or ask that the dog
demonstrate its ability to perform
the work or task.
139
Service Animals- Questions:Service Animals- Questions:
Allergies and fear of dogs are not valid
reasons for denying access or refusing
service to people using service animals.
Affected parties both should be
accommodated by assigning them, if
possible, to different locations within the
room or different rooms in the facility.
140
Service Animals- Questions:Service Animals- Questions:
A person with a disability cannot be asked
to remove his service animal from the
premises unless: (1) the dog is out of control
and the handler does not take effective
action to control it or (2) the dog is not
housebroken. When there is a legitimate
reason to ask that a service animal be
removed, staff must offer the person with
the disability the opportunity to obtain goods
or services without the animal’s presence.
141
Service Animals- Questions:Service Animals- Questions:
Establishments that sell or prepare
food within your building facility, no
matter how expansive or limited,
must allow service animals in public
areas even if state or local health
codes prohibit animals on the
premises.
142
Service Animals- Questions:Service Animals- Questions:
 People with disabilities who use
service animals cannot be isolated
from other people or treated less
favorably than other people.
 Staff are not required to provide
care or food for a service animal.
143
~The Sears Tower Lobby~~The Sears Tower Lobby~
(What do you notice in this picture?)(What do you notice in this picture?)
144
YourYour main lobby.main lobby. The nerve centerThe nerve center
of your entire security programof your entire security program
145
Always takeAlways take PridePride in your buildingin your building
lobbies and keep them clean!lobbies and keep them clean!
146
Access Control measures will alwaysAccess Control measures will always
includeinclude “Tenant”“Tenant” door checks.door checks.
Make sure tenant space isMake sure tenant space is secured.secured.
147
That includesThat includes exteriorexterior entrances &entrances &
common areas of your facilitycommon areas of your facility
148
Effective access control starts with greatEffective access control starts with great
Customer Service…Customer Service…
149
……and not treating visitors or employees likeand not treating visitors or employees like
they are at an armed checkpoint.they are at an armed checkpoint.
150
Protecting your client’s building &Protecting your client’s building &
employees is one of youremployees is one of your primaryprimary
priorities.priorities. Providing exceptionalProviding exceptional
customer servicecustomer service to those sameto those same
employees and visitors is equally asemployees and visitors is equally as
important.important.
151
Personnel should maintain a neat,Personnel should maintain a neat,
clean, and visually attractive front desk.clean, and visually attractive front desk.
152
Building exteriors:Building exteriors:
153
Security staff personnel should on aSecurity staff personnel should on a
periodic basis make visualperiodic basis make visual
inspections of theinspections of the building exteriorbuilding exterior toto
note any evident damage, crackednote any evident damage, cracked
glass, vandalism, or windowglass, vandalism, or window
obstructions.obstructions.
154
““Secondary”Secondary” entrances are just asentrances are just as
important as yourimportant as your primaryprimary entrance.entrance.
All entrances deserve equal scrutiny and careAll entrances deserve equal scrutiny and care
155
If your building has a standard practice of flying theIf your building has a standard practice of flying the
American flag, then the proper protocols should beAmerican flag, then the proper protocols should be
followed with respect to when you lower & raise it.followed with respect to when you lower & raise it.
156
Take Pride in your uniform and yourselfTake Pride in your uniform and yourself
157
All members of the building Mgt. TeamAll members of the building Mgt. Team
are responsible forare responsible for safety & qualitysafety & quality..
158
~Striving to be the~Striving to be the “Best”“Best” starts with beingstarts with being
Well Trained, Alert, & KnowledgeableWell Trained, Alert, & Knowledgeable
159
The beginning of this presentation askedThe beginning of this presentation asked “How“How
high can we reach?”high can we reach?” The answer is simple.The answer is simple.
160
As high as we want~As high as we want~
161
Recommended Reading:Recommended Reading:
162
Thank you for attending today’sThank you for attending today’s
presentation on access controlpresentation on access control
163

More Related Content

Similar to Skyscraper Security Mgt.-Access Control Policies, By- Richard Garrity

So you want to be an architect
So you want to be an architectSo you want to be an architect
So you want to be an architectJosh Holmes
 
Skyscraper Security Mgt- Part vii- Building Systems- Building Designs
Skyscraper Security Mgt-  Part vii- Building Systems- Building DesignsSkyscraper Security Mgt-  Part vii- Building Systems- Building Designs
Skyscraper Security Mgt- Part vii- Building Systems- Building DesignsRichard Garrity
 
J.S. Daniel paper for high rise building construction cycle
J.S. Daniel paper for high rise building construction cycleJ.S. Daniel paper for high rise building construction cycle
J.S. Daniel paper for high rise building construction cycleJ.S. Daniel
 
Reinventing Presidential Tower : How Global Thinking captured a building, cit...
Reinventing Presidential Tower : How Global Thinking captured a building, cit...Reinventing Presidential Tower : How Global Thinking captured a building, cit...
Reinventing Presidential Tower : How Global Thinking captured a building, cit...Nikki Hogan
 
Only the First Drop: Changing the Way Startups are Funded by Denes Ban (OurCr...
Only the First Drop: Changing the Way Startups are Funded by Denes Ban (OurCr...Only the First Drop: Changing the Way Startups are Funded by Denes Ban (OurCr...
Only the First Drop: Changing the Way Startups are Funded by Denes Ban (OurCr...Leadel
 
World Trade Center Noida | WTC Noida
World Trade Center Noida | WTC NoidaWorld Trade Center Noida | WTC Noida
World Trade Center Noida | WTC NoidaPrashant Singh
 

Similar to Skyscraper Security Mgt.-Access Control Policies, By- Richard Garrity (9)

So you want to be an architect
So you want to be an architectSo you want to be an architect
So you want to be an architect
 
Skyscraper Security Mgt- Part vii- Building Systems- Building Designs
Skyscraper Security Mgt-  Part vii- Building Systems- Building DesignsSkyscraper Security Mgt-  Part vii- Building Systems- Building Designs
Skyscraper Security Mgt- Part vii- Building Systems- Building Designs
 
Go big or go home
Go big or go homeGo big or go home
Go big or go home
 
A view from the top
A view from the topA view from the top
A view from the top
 
J.S. Daniel paper for high rise building construction cycle
J.S. Daniel paper for high rise building construction cycleJ.S. Daniel paper for high rise building construction cycle
J.S. Daniel paper for high rise building construction cycle
 
Reinventing Presidential Tower : How Global Thinking captured a building, cit...
Reinventing Presidential Tower : How Global Thinking captured a building, cit...Reinventing Presidential Tower : How Global Thinking captured a building, cit...
Reinventing Presidential Tower : How Global Thinking captured a building, cit...
 
News letter june 12
News letter june 12News letter june 12
News letter june 12
 
Only the First Drop: Changing the Way Startups are Funded by Denes Ban (OurCr...
Only the First Drop: Changing the Way Startups are Funded by Denes Ban (OurCr...Only the First Drop: Changing the Way Startups are Funded by Denes Ban (OurCr...
Only the First Drop: Changing the Way Startups are Funded by Denes Ban (OurCr...
 
World Trade Center Noida | WTC Noida
World Trade Center Noida | WTC NoidaWorld Trade Center Noida | WTC Noida
World Trade Center Noida | WTC Noida
 

More from Richard Garrity

CPR, AED, and Choking Training- By Richard Garrity 2015
CPR, AED, and Choking Training- By Richard Garrity 2015CPR, AED, and Choking Training- By Richard Garrity 2015
CPR, AED, and Choking Training- By Richard Garrity 2015Richard Garrity
 
Richard Garrity, Millis, MA. Legal Opinion Report- Wynn- Las Vegas- Nov. 2013
Richard Garrity, Millis, MA.  Legal Opinion Report- Wynn- Las Vegas- Nov. 2013Richard Garrity, Millis, MA.  Legal Opinion Report- Wynn- Las Vegas- Nov. 2013
Richard Garrity, Millis, MA. Legal Opinion Report- Wynn- Las Vegas- Nov. 2013Richard Garrity
 
Detecting Suicide Bombers, Richard Garrity 2014
Detecting Suicide Bombers, Richard Garrity 2014Detecting Suicide Bombers, Richard Garrity 2014
Detecting Suicide Bombers, Richard Garrity 2014Richard Garrity
 
Fire Life Safety- Evacuation Drills- By Richard Garrity 2015
Fire Life Safety- Evacuation Drills- By Richard Garrity 2015Fire Life Safety- Evacuation Drills- By Richard Garrity 2015
Fire Life Safety- Evacuation Drills- By Richard Garrity 2015Richard Garrity
 
Human Resource Guidelines for Skyscraper Mgt April 2015
Human Resource Guidelines for Skyscraper Mgt April 2015Human Resource Guidelines for Skyscraper Mgt April 2015
Human Resource Guidelines for Skyscraper Mgt April 2015Richard Garrity
 
Business & Psychology Principles applied to Security Mgt.
Business & Psychology Principles applied to Security Mgt.Business & Psychology Principles applied to Security Mgt.
Business & Psychology Principles applied to Security Mgt.Richard Garrity
 
Skyscraper Security Mgt Part III- Section II Life Safety Threats- Aircraft C...
Skyscraper Security Mgt  Part III- Section II Life Safety Threats- Aircraft C...Skyscraper Security Mgt  Part III- Section II Life Safety Threats- Aircraft C...
Skyscraper Security Mgt Part III- Section II Life Safety Threats- Aircraft C...Richard Garrity
 
New Business Development, By Richard Garrity- 2013
New Business Development, By Richard Garrity- 2013New Business Development, By Richard Garrity- 2013
New Business Development, By Richard Garrity- 2013Richard Garrity
 
Use of Force Guidelines- Pepperball Gun- Urban Riot- Richard Garrity
Use of Force Guidelines-  Pepperball Gun- Urban Riot- Richard GarrityUse of Force Guidelines-  Pepperball Gun- Urban Riot- Richard Garrity
Use of Force Guidelines- Pepperball Gun- Urban Riot- Richard GarrityRichard Garrity
 
Corporate Resource Training Group- Crtg Boston
Corporate Resource Training Group- Crtg BostonCorporate Resource Training Group- Crtg Boston
Corporate Resource Training Group- Crtg BostonRichard Garrity
 
Skyscraper Security Mgt- Administration Mgt. Section II Part V
Skyscraper Security Mgt- Administration Mgt. Section II Part VSkyscraper Security Mgt- Administration Mgt. Section II Part V
Skyscraper Security Mgt- Administration Mgt. Section II Part VRichard Garrity
 
Skyscraper Security Mgt.- Administration Mgt. Section 1 Part V
Skyscraper Security Mgt.- Administration Mgt. Section 1 Part VSkyscraper Security Mgt.- Administration Mgt. Section 1 Part V
Skyscraper Security Mgt.- Administration Mgt. Section 1 Part VRichard Garrity
 
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt  Part IV- Bomb Threat Response- Richard GarritySkyscraper Security Mgt  Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard GarrityRichard Garrity
 
Appropriate Corporate Attire- corporate version- by Richard Garrity
Appropriate Corporate Attire-  corporate version- by Richard GarrityAppropriate Corporate Attire-  corporate version- by Richard Garrity
Appropriate Corporate Attire- corporate version- by Richard GarrityRichard Garrity
 
Conflict Resolution Strategy June 2013- Richard Garrity
Conflict Resolution Strategy  June 2013- Richard GarrityConflict Resolution Strategy  June 2013- Richard Garrity
Conflict Resolution Strategy June 2013- Richard GarrityRichard Garrity
 
Skyscraper Security Mgt part III- Life Safety Threats- June 2013
Skyscraper Security Mgt  part III- Life Safety Threats- June 2013Skyscraper Security Mgt  part III- Life Safety Threats- June 2013
Skyscraper Security Mgt part III- Life Safety Threats- June 2013Richard Garrity
 
Emergency Procedures Seminar for tenants of 100 Summer Street, Boston-
Emergency Procedures Seminar for tenants of 100 Summer Street, Boston- Emergency Procedures Seminar for tenants of 100 Summer Street, Boston-
Emergency Procedures Seminar for tenants of 100 Summer Street, Boston- Richard Garrity
 
Sexual Harassment in the Workplace- Richard Garrity
Sexual Harassment in the Workplace- Richard GarritySexual Harassment in the Workplace- Richard Garrity
Sexual Harassment in the Workplace- Richard GarrityRichard Garrity
 
Impressions- Customer Service Skills- April 2013
Impressions- Customer Service Skills- April 2013Impressions- Customer Service Skills- April 2013
Impressions- Customer Service Skills- April 2013Richard Garrity
 
Fire Life Safety- Point of Ignition 2011- By Richard Garrity
Fire Life Safety- Point of Ignition 2011- By Richard GarrityFire Life Safety- Point of Ignition 2011- By Richard Garrity
Fire Life Safety- Point of Ignition 2011- By Richard GarrityRichard Garrity
 

More from Richard Garrity (20)

CPR, AED, and Choking Training- By Richard Garrity 2015
CPR, AED, and Choking Training- By Richard Garrity 2015CPR, AED, and Choking Training- By Richard Garrity 2015
CPR, AED, and Choking Training- By Richard Garrity 2015
 
Richard Garrity, Millis, MA. Legal Opinion Report- Wynn- Las Vegas- Nov. 2013
Richard Garrity, Millis, MA.  Legal Opinion Report- Wynn- Las Vegas- Nov. 2013Richard Garrity, Millis, MA.  Legal Opinion Report- Wynn- Las Vegas- Nov. 2013
Richard Garrity, Millis, MA. Legal Opinion Report- Wynn- Las Vegas- Nov. 2013
 
Detecting Suicide Bombers, Richard Garrity 2014
Detecting Suicide Bombers, Richard Garrity 2014Detecting Suicide Bombers, Richard Garrity 2014
Detecting Suicide Bombers, Richard Garrity 2014
 
Fire Life Safety- Evacuation Drills- By Richard Garrity 2015
Fire Life Safety- Evacuation Drills- By Richard Garrity 2015Fire Life Safety- Evacuation Drills- By Richard Garrity 2015
Fire Life Safety- Evacuation Drills- By Richard Garrity 2015
 
Human Resource Guidelines for Skyscraper Mgt April 2015
Human Resource Guidelines for Skyscraper Mgt April 2015Human Resource Guidelines for Skyscraper Mgt April 2015
Human Resource Guidelines for Skyscraper Mgt April 2015
 
Business & Psychology Principles applied to Security Mgt.
Business & Psychology Principles applied to Security Mgt.Business & Psychology Principles applied to Security Mgt.
Business & Psychology Principles applied to Security Mgt.
 
Skyscraper Security Mgt Part III- Section II Life Safety Threats- Aircraft C...
Skyscraper Security Mgt  Part III- Section II Life Safety Threats- Aircraft C...Skyscraper Security Mgt  Part III- Section II Life Safety Threats- Aircraft C...
Skyscraper Security Mgt Part III- Section II Life Safety Threats- Aircraft C...
 
New Business Development, By Richard Garrity- 2013
New Business Development, By Richard Garrity- 2013New Business Development, By Richard Garrity- 2013
New Business Development, By Richard Garrity- 2013
 
Use of Force Guidelines- Pepperball Gun- Urban Riot- Richard Garrity
Use of Force Guidelines-  Pepperball Gun- Urban Riot- Richard GarrityUse of Force Guidelines-  Pepperball Gun- Urban Riot- Richard Garrity
Use of Force Guidelines- Pepperball Gun- Urban Riot- Richard Garrity
 
Corporate Resource Training Group- Crtg Boston
Corporate Resource Training Group- Crtg BostonCorporate Resource Training Group- Crtg Boston
Corporate Resource Training Group- Crtg Boston
 
Skyscraper Security Mgt- Administration Mgt. Section II Part V
Skyscraper Security Mgt- Administration Mgt. Section II Part VSkyscraper Security Mgt- Administration Mgt. Section II Part V
Skyscraper Security Mgt- Administration Mgt. Section II Part V
 
Skyscraper Security Mgt.- Administration Mgt. Section 1 Part V
Skyscraper Security Mgt.- Administration Mgt. Section 1 Part VSkyscraper Security Mgt.- Administration Mgt. Section 1 Part V
Skyscraper Security Mgt.- Administration Mgt. Section 1 Part V
 
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt  Part IV- Bomb Threat Response- Richard GarritySkyscraper Security Mgt  Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
 
Appropriate Corporate Attire- corporate version- by Richard Garrity
Appropriate Corporate Attire-  corporate version- by Richard GarrityAppropriate Corporate Attire-  corporate version- by Richard Garrity
Appropriate Corporate Attire- corporate version- by Richard Garrity
 
Conflict Resolution Strategy June 2013- Richard Garrity
Conflict Resolution Strategy  June 2013- Richard GarrityConflict Resolution Strategy  June 2013- Richard Garrity
Conflict Resolution Strategy June 2013- Richard Garrity
 
Skyscraper Security Mgt part III- Life Safety Threats- June 2013
Skyscraper Security Mgt  part III- Life Safety Threats- June 2013Skyscraper Security Mgt  part III- Life Safety Threats- June 2013
Skyscraper Security Mgt part III- Life Safety Threats- June 2013
 
Emergency Procedures Seminar for tenants of 100 Summer Street, Boston-
Emergency Procedures Seminar for tenants of 100 Summer Street, Boston- Emergency Procedures Seminar for tenants of 100 Summer Street, Boston-
Emergency Procedures Seminar for tenants of 100 Summer Street, Boston-
 
Sexual Harassment in the Workplace- Richard Garrity
Sexual Harassment in the Workplace- Richard GarritySexual Harassment in the Workplace- Richard Garrity
Sexual Harassment in the Workplace- Richard Garrity
 
Impressions- Customer Service Skills- April 2013
Impressions- Customer Service Skills- April 2013Impressions- Customer Service Skills- April 2013
Impressions- Customer Service Skills- April 2013
 
Fire Life Safety- Point of Ignition 2011- By Richard Garrity
Fire Life Safety- Point of Ignition 2011- By Richard GarrityFire Life Safety- Point of Ignition 2011- By Richard Garrity
Fire Life Safety- Point of Ignition 2011- By Richard Garrity
 

Recently uploaded

MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCRalexsharmaa01
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 

Recently uploaded (20)

MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 

Skyscraper Security Mgt.-Access Control Policies, By- Richard Garrity

  • 1. Skyscraper Security Mgt.Skyscraper Security Mgt. Part IPart I By, Richard GarrityBy, Richard Garrity
  • 2. 2 Skyscraper Security Mgt.Skyscraper Security Mgt. Access Control Procedures-Access Control Procedures- Part IPart I
  • 3. 3 High Rise Access ControlHigh Rise Access Control This presentation is proprietary information and can’t be copied or reproduced in any fashion without consent from the publisher owner, Richard Garrity
  • 4. 4 How High Can We Reach?How High Can We Reach?
  • 5. 5 The past reflects on the new…The past reflects on the new…
  • 6. 6 Los Angeles night skylineLos Angeles night skyline
  • 7. 7 Pershing Square, Los Angeles, CA.Pershing Square, Los Angeles, CA.
  • 8. 8 New York City SkylineNew York City Skyline
  • 9. 9 International Place, Boston, MA.International Place, Boston, MA.
  • 10. 10 Atlantic Ave, Boston, MA.Atlantic Ave, Boston, MA.
  • 12. 12 100 Summer St, Boston, MA.100 Summer St, Boston, MA.
  • 14. 14 Hong Kong skyline at nightHong Kong skyline at night
  • 15. 15 High Rise Lobby Operations:High Rise Lobby Operations: Definitions and Purpose:Definitions and Purpose:
  • 16. 16 High Rise Access ControlHigh Rise Access Control The purpose of this slide presentationThe purpose of this slide presentation is to give security professionals a moreis to give security professionals a more profound meaning and understandingprofound meaning and understanding to the specifics of high and mid riseto the specifics of high and mid rise office tower access control.office tower access control. The information contained herein isThe information contained herein is proprietary and not to be copy-writtenproprietary and not to be copy-written in any manor or fashion.in any manor or fashion.
  • 17. 17 High Rise Access ControlHigh Rise Access Control This presentation looks at theThis presentation looks at the various measures and bestvarious measures and best practices for lobby and receptionpractices for lobby and reception area security, including differentarea security, including different types of technology and systemstypes of technology and systems that can aid in access control.that can aid in access control. However, the core element toHowever, the core element to access control is the securityaccess control is the security personnel assigned to protect ourpersonnel assigned to protect our office buildings.office buildings.
  • 18. 18 This presentation will focus on 7This presentation will focus on 7 primaryprimary operational objectives:operational objectives: 1. Building Class Definitions1. Building Class Definitions 2. Physical Security/ Procedures2. Physical Security/ Procedures 3. General Strategies3. General Strategies 4. Monitoring your lobby & visitors4. Monitoring your lobby & visitors 5. Chain of command5. Chain of command 6.6. Segment from the Sears tower directorSegment from the Sears tower director 7.7. ADA Act-ADA Act- Service Animals GuidelinesService Animals Guidelines
  • 19. 19 Corporate Security:Corporate Security: A valued industry earningA valued industry earning more respect everydaymore respect everyday
  • 20. 20 100 Summer Street, Boston:100 Summer Street, Boston: Your building lobby reflects your commitmentYour building lobby reflects your commitment to excellence & qualityto excellence & quality
  • 21. 21 Brief History of theBrief History of the American Office Tower:American Office Tower:  The Park Street Church in Boston was theThe Park Street Church in Boston was the tallest building in America from the yearstallest building in America from the years 1810-1846 @ 217 feet.1810-1846 @ 217 feet.  The first steel framed skyscraper in theThe first steel framed skyscraper in the United States was the 10 story HomeUnited States was the 10 story Home Insurance Building- Chicago in 1885.Insurance Building- Chicago in 1885.  The Twin Towers in New York were builtThe Twin Towers in New York were built to last 500 years. They lasted just 29 years~to last 500 years. They lasted just 29 years~
  • 23. 23 Building Class Definitions:Building Class Definitions: For the purposes of comparison,For the purposes of comparison, office space is grouped intooffice space is grouped into threethree classesclasses in accordance with one of twoin accordance with one of two alternative bases:alternative bases: metropolitanmetropolitan andand international. These classes representinternational. These classes represent a subjective quality rating of buildingsa subjective quality rating of buildings which indicates the competitive abilitywhich indicates the competitive ability of each building to attract similarof each building to attract similar types of tenants.types of tenants.
  • 24. 24 Building Class Definitions:Building Class Definitions: Class AClass A Most prestigious buildingsMost prestigious buildings competing for premier office userscompeting for premier office users with rents above average for thewith rents above average for the area. Buildings have high qualityarea. Buildings have high quality standard finishes, state of the artstandard finishes, state of the art systems, exceptional accessibilitysystems, exceptional accessibility and a definite market presence.and a definite market presence.
  • 25. 25 Building Class Definitions:Building Class Definitions: Class BClass B Buildings competing for a wideBuildings competing for a wide range of users with rents in therange of users with rents in the average range for the area. Buildingaverage range for the area. Building finishes are fair to good for the areafinishes are fair to good for the area and systems are adequate, but theand systems are adequate, but the building does not compete withbuilding does not compete with Class A at the same price.Class A at the same price.
  • 26. 26 Building Class Definitions:Building Class Definitions: Class CClass C Building owners competing forBuilding owners competing for tenants requiring functionaltenants requiring functional office space at rents below theoffice space at rents below the average for the market area.average for the market area. *Cite: Data provided by BOMA
  • 27. 27 High Rise VS. Mid RiseHigh Rise VS. Mid Rise Low Rise-Low Rise- is a building that is only ais a building that is only a few stories tall.few stories tall. Mid Rise-Mid Rise- is any building that isis any building that is generally 8-10 stories tall.generally 8-10 stories tall. High Rise-High Rise- is any building that isis any building that is generally 10-14 stories or tallergenerally 10-14 stories or taller depending on the urban skyline.depending on the urban skyline.
  • 28. 28 The origin ofThe origin of “Skyscraper”“Skyscraper” The wordThe word "skyscraper""skyscraper" originallyoriginally was a nautical term referring to awas a nautical term referring to a small triangular sail set abovesmall triangular sail set above the skysail on a sailing ship. Thethe skysail on a sailing ship. The term was first applied toterm was first applied to buildings of steel framedbuildings of steel framed construction of at leastconstruction of at least 10 stories10 stories in the late 19th centuryin the late 19th century
  • 29. 29 Different Levels of Access Control:Different Levels of Access Control:
  • 30. 30 Different Levels of Access Control:Different Levels of Access Control: Open Access-Open Access- this is an environmentthis is an environment where employees and visitors can enterwhere employees and visitors can enter the building without restriction orthe building without restriction or limitations during normal businesslimitations during normal business hours. They are free to proceed to theirhours. They are free to proceed to their destination withoutdestination without challenge or signingchallenge or signing in nor are they subject to any bagin nor are they subject to any bag inspections. Although generally, peopleinspections. Although generally, people entering should always beentering should always be monitored andmonitored and eye contacteye contact made, even by a simplemade, even by a simple Hello.Hello.
  • 31. 31 Different Levels of Access Control:Different Levels of Access Control: Limited Access:Limited Access: this is an environmentthis is an environment where employees, visitors, etc. can enter awhere employees, visitors, etc. can enter a building lobby with little restriction duringbuilding lobby with little restriction during normal business hours. They are free tonormal business hours. They are free to proceed to their destination, however, theyproceed to their destination, however, they are first screened by uniformed securityare first screened by uniformed security personnel as to where they are going.personnel as to where they are going. Employees/ Visitors are not announced orEmployees/ Visitors are not announced or required to sign in, or show an ID.required to sign in, or show an ID.
  • 32. 32 Different Levels of Access Control:Different Levels of Access Control: Security personnel are prettySecurity personnel are pretty much making a visual screen ofmuch making a visual screen of the person or persons, thenthe person or persons, then directing them to theirdirecting them to their destination. Examples of suchdestination. Examples of such access procedures are:access procedures are: The Empire State Building in New YorkThe Empire State Building in New York and Union Trust Co. in Providence, RIand Union Trust Co. in Providence, RI
  • 33. 33 Different Levels of Access Control:Different Levels of Access Control: Restricted Access:Restricted Access: this is anthis is an environment where all employees,environment where all employees, visitors, vendors, etc must check in withvisitors, vendors, etc must check in with front desk security/ company personnelfront desk security/ company personnel to be screened. No one without a validto be screened. No one without a valid building issued ID will be allowed tobuilding issued ID will be allowed to proceed past the front desk. Allproceed past the front desk. All employees who have a valid company IDemployees who have a valid company ID can either display the badge to an Officercan either display the badge to an Officer or some lobbies provide some type ofor some lobbies provide some type of electronic swipe or scan to allow them toelectronic swipe or scan to allow them to their intended destination.their intended destination.
  • 34. 34 Different Levels of Access Control:Different Levels of Access Control: Restricted Access:Restricted Access: Employees who do not have aEmployees who do not have a valid company ID badge or havevalid company ID badge or have forgotten such badge, must sign inforgotten such badge, must sign in with security personnel bywith security personnel by showing some form of ashowing some form of a government ID. They may eithergovernment ID. They may either proceed from there, or they mayproceed from there, or they may have to be announced & escorted.have to be announced & escorted.
  • 35. 35 Restricted Access Continued:Restricted Access Continued: Visitors to the building maybeVisitors to the building maybe subjected to the following: Theysubjected to the following: They will have to sign in, show a validwill have to sign in, show a valid state issued ID and be announcedstate issued ID and be announced to the perspective tenant they areto the perspective tenant they are visiting. There are various signingvisiting. There are various signing in procedures, within procedures, with EZ LobbyEZ Lobby being the most desirable.being the most desirable.
  • 36. 36 Restricted Access Continued:Restricted Access Continued: AA Visitors badgeVisitors badge should always beshould always be issued with an expiration date. Someissued with an expiration date. Some lobby operations may require thatlobby operations may require that bag inspectionsbag inspections are made but that isare made but that is extremely rare in the private sector.extremely rare in the private sector. Usually bag inspections and wandingUsually bag inspections and wanding are done when entering aare done when entering a local, state,local, state, or federal building.or federal building.
  • 37. 37 Worker replaces light bulb on top ofWorker replaces light bulb on top of the eagle-the eagle- Chrysler Building, NYChrysler Building, NY
  • 38. 38 Notre Dame- GargoylesNotre Dame- Gargoyles watching overwatching over Paris, FranceParis, France
  • 40. 40 Definition: Physical Security:Definition: Physical Security: Physical security describes both measures that are designed to deny access to individuals from physically accessing a facility, resource, or information stored on physical media, and guidance on how to design structures to resist various hostile acts.
  • 41. 41 Definition: Physical Security:Definition: Physical Security: It can be as simple as a locked door or as elaborate as multiple layers of barriers, armed or unarmed security officers, and guardhouse placement. Physical security is not a modern phenomenon. Physical security exists in order to deter persons from entering a facility.
  • 43. 43 Policies and Procedures:Policies and Procedures: It's really easy toIt's really easy to overlookoverlook lobbieslobbies andand reception areas when it comes toreception areas when it comes to designing and implementing andesigning and implementing an overall security strategy. After all,overall security strategy. After all, security officials have become sosecurity officials have become so focused on protecting what's insidefocused on protecting what's inside and at the core of their facilities, thatand at the core of their facilities, that they often neglect what's in front ofthey often neglect what's in front of them..thethem..the entryways.entryways.
  • 44. 44 Policies and Procedures:Policies and Procedures: Balancing the rightBalancing the right environment with the rightenvironment with the right mix ofmix of securitysecurity is definitelyis definitely not an easy task, but onenot an easy task, but one that can be mastered.that can be mastered.
  • 45. 45 Policies and Procedures:Policies and Procedures: As new threats present themselves andAs new threats present themselves and intruders become craftier, moreintruders become craftier, more proactiveproactive security measuressecurity measures are necessary to protectare necessary to protect the front lines of business. It can no longer bethe front lines of business. It can no longer be assumed that security is somethingassumed that security is something implemented once and then forgotten — orimplemented once and then forgotten — or that it is solely the responsibility of onethat it is solely the responsibility of one department. Building personnel and the highdepartment. Building personnel and the high rise office towers we protect, are dependentrise office towers we protect, are dependent on ouron our competencecompetence,, trainingtraining,, diligencediligence,, alertnessalertness,, and most importantly, ourand most importantly, our dedicateddedicated commitment to insure we cancommitment to insure we can safeguard the lobby and premises the bestsafeguard the lobby and premises the best that we can.that we can.
  • 46. 46 Policies and Procedures:Policies and Procedures: We are in a whole new age, aWe are in a whole new age, a new world, where thenew world, where the corporatecorporate security officersecurity officer is expected tois expected to know building systems, complexknow building systems, complex procedures, and knowledge ofprocedures, and knowledge of certain operating procedurescertain operating procedures thatthat 20 years ago20 years ago were un-were un- applicable and unimaginable.applicable and unimaginable.
  • 47. 47 Policies and Procedures:Policies and Procedures: Defining and implementingDefining and implementing policiespolicies and proceduresand procedures that are tailoredthat are tailored specifically to your securityspecifically to your security environment can go a long way inenvironment can go a long way in keeping lobbies and reception areaskeeping lobbies and reception areas secure. Here are somesecure. Here are some generalgeneral strategiesstrategies that can help shape thethat can help shape the future and effectiveness of yourfuture and effectiveness of your building security program.building security program.
  • 49. 49 Developing a comprehensive security trainingDeveloping a comprehensive security training program for all employees is one of the mostprogram for all employees is one of the most important security measures an organizationimportant security measures an organization can deploy. The training is especially critical forcan deploy. The training is especially critical for front-line staff, such asfront-line staff, such as security officerssecurity officers andand receptionistsreceptionists,, so they have a sophisticatedso they have a sophisticated understanding of the potential risks andunderstanding of the potential risks and vulnerabilities associated with their work areas,vulnerabilities associated with their work areas, and know properand know proper emergency procedures.emergency procedures. * General strategies segment extracted from South Station “JAM”* General strategies segment extracted from South Station “JAM” presentation on March 15presentation on March 15thth , 2006- by Richard Garrity, 2006- by Richard Garrity Provide proper Training:Provide proper Training:
  • 50. 50 High Rise Access ControlHigh Rise Access Control Restrict the flow ofRestrict the flow of pedestrian traffic into a facility:pedestrian traffic into a facility: Even something as simple as a turnstile, aEven something as simple as a turnstile, a type of gate that allows only one person totype of gate that allows only one person to pass per rotation — can help significantly topass per rotation — can help significantly to manage the flowmanage the flow of traffic into a facility.of traffic into a facility. Another way to restrict the flow of traffic is toAnother way to restrict the flow of traffic is to limit access to the facility with only one or twolimit access to the facility with only one or two entry points that can be closely monitored.entry points that can be closely monitored. However, keep in mind obviously, that theseHowever, keep in mind obviously, that these options may not be financially or aestheticallyoptions may not be financially or aesthetically feasible in any one given environment or anyfeasible in any one given environment or any particular buildingparticular building..
  • 51. 51 General Strategies:General Strategies: But, a hands on proactiveBut, a hands on proactive securitysecurity managermanager should always introduce, asshould always introduce, as suggestions and alternatives, thesesuggestions and alternatives, these devices during quarterly and or yearlydevices during quarterly and or yearly security operation reviews. In addition, thesecurity operation reviews. In addition, the proactive front line security officer canproactive front line security officer can always provide some of the best accessalways provide some of the best access control suggestions and or updatescontrol suggestions and or updates because they are there everyday andbecause they are there everyday and observe what areobserve what are strengthsstrengths andand weaknessesweaknesses in the building lobby accessin the building lobby access procedures.procedures.
  • 52. 52 General Strategies:General Strategies: Enforce that visitorsEnforce that visitors wear Visitor badges:wear Visitor badges: A badge offers temporary identification andA badge offers temporary identification and may include, for example, the visitor's name,may include, for example, the visitor's name, date, time and the person they are seeing. Theydate, time and the person they are seeing. They can either be low-tech (handwritten stickycan either be low-tech (handwritten sticky badges) or high-tech (a professional print-outbadges) or high-tech (a professional print-out with color photo). The most effective thus farwith color photo). The most effective thus far has been devices likehas been devices like EZ LobbyEZ Lobby that canthat can document and track a Visitor’s arrival,document and track a Visitor’s arrival, destination, and departure.destination, and departure.
  • 53. 53 General Strategies:General Strategies: Ensure visitors are not left alone:Ensure visitors are not left alone: It may not be possible to be at a visitor'sIt may not be possible to be at a visitor's side at all times, but, when possible,side at all times, but, when possible, guests should not be left alone unless theyguests should not be left alone unless they have beenhave been properly clearedproperly cleared by the tenantby the tenant contact or have been greeted by the tenantcontact or have been greeted by the tenant contact andcontact and escortedescorted to the confirmedto the confirmed floor, space, and destination. Not only isfloor, space, and destination. Not only is this a polite gesture, it is also a proactivethis a polite gesture, it is also a proactive security measure.security measure.
  • 55. 55 Access Control Priority 1Access Control Priority 1 Priority number 1Priority number 1 in any restrictedin any restricted or even limited access controlor even limited access control environment is thatenvironment is that no oneno one …… no oneno one enters the facility without showing aenters the facility without showing a valid activated company / tenant ID.valid activated company / tenant ID. No visitor or contractor shall ever beNo visitor or contractor shall ever be able to circumvent your access controlable to circumvent your access control procedures, ever!procedures, ever!
  • 56. 56 Access Control Priority 2Access Control Priority 2 Priority number 2Priority number 2 in any restricted orin any restricted or even limited access control environment is thateven limited access control environment is that any employee who forgets or has lost their IDany employee who forgets or has lost their ID shall not be permitted access orshall not be permitted access or “waived”“waived” in.in. They must sign-in and be approved by saidThey must sign-in and be approved by said Supervisor. No matter how well you maybeSupervisor. No matter how well you maybe acquainted with any given employee, they veryacquainted with any given employee, they very well could have beenwell could have been terminatedterminated the previousthe previous day or even the present day without yourday or even the present day without your knowledge.knowledge.
  • 57. 57 Incident- Case Spotlight:Incident- Case Spotlight: On December 14On December 14thth , 2008, 2008 in Britishin British Columbia, a man named Eric AllenColumbia, a man named Eric Allen Kirkpatrick shot and killed his former BossKirkpatrick shot and killed his former Boss CEO David BankyCEO David Banky of Tallgrass Distribution at their annual Christmas Party. Kirkpatrick was fired the day before and un-invited. Kirkpatrick was able to gain access as lobby security was used to seeing him everyday and let him thru without an ID verification. (Waved thru).
  • 58. 58 Incident- Case Spotlight:Incident- Case Spotlight: The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident This access oversight very well may have cost Mr. Banky his life. However, several critical notations to this episode must be addressed. Human Resources for this company had failed to properly notify Security officials of Kirkpatrick’s termination in a timely manor. There was no “Pass On” memo.
  • 59. 59 Incident- Case Spotlight:Incident- Case Spotlight: The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident Regardless, if the desk officer had followed procedure and contacted Kirpatrick’s supervisor for access approval, then Security would have been advised that said individual was terminated the day before.
  • 60. 60 Incident- Case Spotlight:Incident- Case Spotlight: The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident That may have not have prevented direct violence by Kirpatrick either there at the lobby area (after denial was communicated) or somewhere else within the building, but it would have given security personnel critical time to call 911 and to significantly reduce the potential casualties to employees. It is also possible that after said denial was given, that he could have left the premises without incident.
  • 62. 62 Properly checkingProperly checking employeeemployee ID’sID’s and processing otherand processing other identification fromidentification from visitorsvisitors isis one of the mostone of the most criticalcritical dutiesduties a corporate security officera corporate security officer engages in everyday.engages in everyday. Employee Identification:Employee Identification:
  • 64. 64 If a building access card isIf a building access card is coming up ascoming up as “rejected”“rejected” onon youryour facility access controlfacility access control screen (C-Cure 800, Spectrumscreen (C-Cure 800, Spectrum software, etc.)software, etc.) DO NOT ignoreDO NOT ignore it,it, investigate it.investigate it. ““Rejected Access”Rejected Access” Card Alerts:Card Alerts:
  • 65. 65 Are there after-hoursAre there after-hours weakweak entry pointsentry points that could compromise yourthat could compromise your building?building? Your tenants?Your tenants?
  • 66. 66 High Rise Access Control-High Rise Access Control- Monitoring yourMonitoring your Lobby / VisitorsLobby / Visitors
  • 67. 67 Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors The primary concern is the securityThe primary concern is the security personnel who take their eyes off thepersonnel who take their eyes off the visitor orvisitor or non clearednon cleared entrants, andentrants, and loose trackloose track of them. This is whereof them. This is where safety, liability, and service qualitysafety, liability, and service quality concerns originate. When all is saidconcerns originate. When all is said and done, professional sharp accessand done, professional sharp access control team members are one of thecontrol team members are one of the top priorities we focus on.top priorities we focus on.
  • 68. 68 Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors In the grand scheme of things,In the grand scheme of things, when we are taking legitimatewhen we are taking legitimate business calls or assisting a personbusiness calls or assisting a person with directions, or transmitting onwith directions, or transmitting on the Nextel to Engineering, nothingthe Nextel to Engineering, nothing should have yourshould have your attentionattention more,more, than the flow of traffic into yourthan the flow of traffic into your building. Equally vital is the diligentbuilding. Equally vital is the diligent tracking of alltracking of all visitors and vendorsvisitors and vendors who are awaiting processing at anywho are awaiting processing at any givengiven security checkpoint.security checkpoint.
  • 69. 69 Your eyes should not be taken off theYour eyes should not be taken off the general view of the lobby perimeter, notgeneral view of the lobby perimeter, not for evenfor even 1 second1 second.. Whatever you areWhatever you are doing, whoever you are with, you shoulddoing, whoever you are with, you should be at ALL times, tracking your lobbybe at ALL times, tracking your lobby perimeter and the individuals enteringperimeter and the individuals entering them. This of course also pertains to thethem. This of course also pertains to the scanning or displaying of employeescanning or displaying of employee work ID’s and any other acceptablework ID’s and any other acceptable Identification currently cleared by yourIdentification currently cleared by your Property Management Team.Property Management Team. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  • 70. 70 These access control protocols are fairlyThese access control protocols are fairly standard throughout the building securitystandard throughout the building security industry. However, we must also address theindustry. However, we must also address the current state of physical electronic accesscurrent state of physical electronic access control security measures introduced to highcontrol security measures introduced to high rise buildings in the last 10 years or so. Withrise buildings in the last 10 years or so. With the introduction of fast lane type glassthe introduction of fast lane type glass barriers and turn-styles, lobby securitybarriers and turn-styles, lobby security personnel are not required to be as acutelypersonnel are not required to be as acutely alert as they would normally be with thealert as they would normally be with the traditionaltraditional “show and pass”“show and pass” identificationidentification methods of the past.methods of the past. Let me explain…Let me explain… Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  • 71. 71 There are several methods of employeesThere are several methods of employees entering a building and gaining access.entering a building and gaining access. They are:They are: 1.1. Displaying an ID to the desk officer andDisplaying an ID to the desk officer and proceeding to their floor destination.proceeding to their floor destination. 2. Displaying an ID and or scanning it in a2. Displaying an ID and or scanning it in a stationary reader, waiting for a beepstationary reader, waiting for a beep approval (usually aapproval (usually a green lightgreen light) and) and proceeding to their floor destination. Aproceeding to their floor destination. A red lightred light usually means a rejected card,usually means a rejected card, where upon the lobby personnel willwhere upon the lobby personnel will motion the person to stop so the cardmotion the person to stop so the card and or status can be examined.and or status can be examined. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  • 72. 72 3. Swiping your employee ID into a3. Swiping your employee ID into a scanner or reader that activatesscanner or reader that activates access approval from the fast laneaccess approval from the fast lane typetype glass barriers,glass barriers, thus pretty muchthus pretty much by-passing security lobby personnelby-passing security lobby personnel or interaction to achieve saidor interaction to achieve said approval.approval. 4. Executing the same access procedure4. Executing the same access procedure except for the use of theexcept for the use of the turn-styleturn-style type access barriers.type access barriers. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  • 73. 73 5. Gaining access into a facility5. Gaining access into a facility usingusing bio-metrics-bio-metrics- the eye-the eye- retinal scan or pressing yourretinal scan or pressing your thumb into a reader to verifythumb into a reader to verify your on-file fingerprint. This isyour on-file fingerprint. This is especially rare in the privateespecially rare in the private sector and more common insector and more common in federal type facilities.federal type facilities. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  • 74. 74 ToTo re-cap,re-cap, we should stress thatwe should stress that lobby security personnel shouldlobby security personnel should be keenly alert of their lobbybe keenly alert of their lobby perimeter and flow of people atperimeter and flow of people at all times. However, with the useall times. However, with the use of the glass barriers & turn-of the glass barriers & turn- styles, it makes the job a wholestyles, it makes the job a whole lot morelot more manageablemanageable and betterand better toto control.control. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  • 75. 75 Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors Individuals,Individuals, who fail towho fail to comply with your accesscomply with your access control policies, should becontrol policies, should be asked to leave the premisesasked to leave the premises politely. Do not engage inpolitely. Do not engage in heatedheated disagreementdisagreement oror argumentargument. That approach is. That approach is not recommended, and isnot recommended, and is prohibited.prohibited.
  • 76. 76 Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors ““If several attempts to have theIf several attempts to have the individual leave are not realized,individual leave are not realized, you should contact youryou should contact your shiftshift supervisorsupervisor and orand or security managersecurity manager for assistance. They will thenfor assistance. They will then determine if thedetermine if the PolicePolice should beshould be summoned to remove such personsummoned to remove such person who has no clear, legitimatewho has no clear, legitimate business in the facility.”business in the facility.”
  • 77. 77 Those access control moments:Those access control moments:
  • 78. 78 Those access control moments:Those access control moments: If during the course of your accessIf during the course of your access control duties, you come across ancontrol duties, you come across an individual who does not have theirindividual who does not have their employee ID but starts with theemployee ID but starts with the “Do you“Do you know who I am”know who I am” salty routine, then firmly,salty routine, then firmly, but politely explain that yes they maybebut politely explain that yes they maybe someone important, but the buildingsomeone important, but the building access control policies apply to ALLaccess control policies apply to ALL building occupants. If they demand tobuilding occupants. If they demand to “speak”“speak” with your supervisor, absolutely,with your supervisor, absolutely, let them.let them.
  • 79. 79 Those access control moments:Those access control moments: What do I do if an anxiousWhat do I do if an anxious employee states they have lost oremployee states they have lost or forgotten their company ID andforgotten their company ID and we can’twe can’t contactcontact their directtheir direct supervisor for approval? Do wesupervisor for approval? Do we tell them to wait? Come backtell them to wait? Come back some other time?some other time?
  • 80. 80 Those access control moments:Those access control moments: Absolutely not.Absolutely not. Although we are supposeAlthough we are suppose to engage in strict access controlto engage in strict access control protocols, we are also expected to deliverprotocols, we are also expected to deliver exemplary customer service to all. Theexemplary customer service to all. The remedy to this particular dilemma wouldremedy to this particular dilemma would be if you can’t contact an appropriatebe if you can’t contact an appropriate representative from the employee’srepresentative from the employee’s company to approve access, then takecompany to approve access, then take other alternative measures so that theother alternative measures so that the employee can be processed efficiently.employee can be processed efficiently.
  • 81. 81 Those access control moments:Those access control moments: Examples to remedy the situation:Examples to remedy the situation: 1. Contact another security officer or1. Contact another security officer or supervisor andsupervisor and escortescort the employeethe employee to their floor, then find an authorizedto their floor, then find an authorized individual who willindividual who will grantgrant access andaccess and take over from there. During thistake over from there. During this escort phase, the employee can’tescort phase, the employee can’t leave your presence until saidleave your presence until said access has been granted.access has been granted.
  • 82. 82 Those access control moments:Those access control moments: Examples to remedy the situation:Examples to remedy the situation: 2. If you can’t contact the employee’s2. If you can’t contact the employee’s direct supervisor or manager, and andirect supervisor or manager, and an escort is not available at thatescort is not available at that moment, then contact the companymoment, then contact the company receptionist, explain the situationreceptionist, explain the situation and request if someone who isand request if someone who is authorized within the company canauthorized within the company can come down and escort the employee.come down and escort the employee.
  • 83. 83 Those access control moments:Those access control moments: 3. If both of these measures have3. If both of these measures have not producednot produced the desired result,the desired result, then simply contact your security orthen simply contact your security or property manager and explain theproperty manager and explain the circumstances, this is especiallycircumstances, this is especially important if the employee is late forimportant if the employee is late for work, late for a meeting, orwork, late for a meeting, or extremelyextremely agitated & verbal.agitated & verbal.
  • 84. 84 Just who is in your lobby?Just who is in your lobby?
  • 85. 85 Just who is in your lobby?Just who is in your lobby? The very essence ofThe very essence of access controlaccess control starts the moment someone, anyone,starts the moment someone, anyone, entersenters your building. Enters youryour building. Enters your lobby. Even if they do not attempt tolobby. Even if they do not attempt to gain access, who are they? What isgain access, who are they? What is their purpose? Never jump totheir purpose? Never jump to conclusions or assume, but alwaysconclusions or assume, but always watch and learnwatch and learn your surroundings.your surroundings.
  • 86. 86 The Access Control Motto:The Access Control Motto: “NO ID…No Entrance”“NO ID…No Entrance”
  • 87. 87 Your client buildingYour client building Management Team:Management Team:
  • 88. 88 Your client building Mgt. Team:Your client building Mgt. Team: Site Critical Directive:Site Critical Directive: Never hesitate to reach out to anyNever hesitate to reach out to any member of yourmember of your Property Mgt.Property Mgt. TeamTeam for questions you don’t have thefor questions you don’t have the answer to. They know the buildinganswer to. They know the building operations better than anyone andoperations better than anyone and can give you proper guidance whencan give you proper guidance when your immediate supervisor may notyour immediate supervisor may not be available.be available.
  • 90. 90 High Rise Access ControlHigh Rise Access Control Priority number 3Priority number 3-- In the event that anIn the event that an unauthorizedunauthorized person shouldperson should slip by your post, refuses toslip by your post, refuses to show an ID, or ignores yourshow an ID, or ignores your demands todemands to STOPSTOP, do the, do the following actions & maintainfollowing actions & maintain radio contact:radio contact:
  • 91. 91 High Rise Access ControlHigh Rise Access Control NEVERNEVER place your hands on the subject to stopplace your hands on the subject to stop them. Make loud and consistent verbalthem. Make loud and consistent verbal commands for the subject tocommands for the subject to STOPSTOP while at thewhile at the same time repeatedly stating the access policy.same time repeatedly stating the access policy. Always try to step in front of the trespasser andAlways try to step in front of the trespasser and block further access, but do not make anyblock further access, but do not make any physical contact. During this time calls forphysical contact. During this time calls for backback upup should be made and ifshould be made and if Police notificationPolice notification isis necessary, dialnecessary, dial 911911 and report the situation.and report the situation. Never lose sight of subject or his/her location.Never lose sight of subject or his/her location.
  • 92. 92 High Rise Access ControlHigh Rise Access Control This general interdiction policy if anThis general interdiction policy if an intruder breaches your lobby perimeterintruder breaches your lobby perimeter applies also in the event that you catchapplies also in the event that you catch someonesomeone breaking intobreaking into your building oryour building or is in the process of attempting to breakis in the process of attempting to break into your facility.into your facility. “Confront”“Confront” from afrom a distance when it is clear to you that thedistance when it is clear to you that the person you have encountered clearly isperson you have encountered clearly is not authorized to be there.not authorized to be there.
  • 93. 93 High Rise Access ControlHigh Rise Access Control Maintain constantMaintain constant radioradio contact, follow from acontact, follow from a distance, and try and get asdistance, and try and get as much of a physicalmuch of a physical description of the perpetrator.description of the perpetrator. Safety Safety SafetySafety Safety Safety is youris your foremost concern.foremost concern.
  • 94. 94 High Rise Access ControlHigh Rise Access Control More in depth instructions onMore in depth instructions on how to deal withhow to deal with unauthorizedunauthorized building intrusions and use ofbuilding intrusions and use of force procedures will be coveredforce procedures will be covered in the Legal Authority/ Uniformin the Legal Authority/ Uniform Protocol training module.Protocol training module.
  • 95. 95 Is your lobby area well observed?Is your lobby area well observed? What is wrong with this lobby?What is wrong with this lobby?
  • 96. 96 1. There is an individual shooting or filming1. There is an individual shooting or filming the lobby- far left.the lobby- far left. 2.2. There is an individual clearly takenThere is an individual clearly taken photographs- next to the down escalatorsphotographs- next to the down escalators 3. There is no Mgt. presence in the lobby to3. There is no Mgt. presence in the lobby to question or cease such activity.question or cease such activity. 4.4. There is no Security personnel at the frontThere is no Security personnel at the front desk or visible in the lobby.desk or visible in the lobby. Is your lobby area well observed?Is your lobby area well observed?
  • 98. 98 Absolutely noAbsolutely no image reproductionimage reproduction either byeither by devices like cameras, cell phones, or videodevices like cameras, cell phones, or video cameras are made of your lobby/interiorcameras are made of your lobby/interior premises unless approved bypremises unless approved by PropertyProperty Management.Management. Image reproduction of yourImage reproduction of your exteriorexterior building and grounds should bebuilding and grounds should be strongly discouraged, but legally we can notstrongly discouraged, but legally we can not STOPSTOP someone from photographing thesomeone from photographing the exterior premises.exterior premises. High Rise Access Control-High Rise Access Control-
  • 99. 99 Legal Restraining Orders:Legal Restraining Orders:
  • 100. 100 Security personnel must beSecurity personnel must be cognizant of employees that havecognizant of employees that have activeactive “restraining orders”.“restraining orders”. AlwaysAlways check for updates, status, and thecheck for updates, status, and the picture of the person who has thepicture of the person who has the restraining order taken out againstrestraining order taken out against them. These critical updates must bethem. These critical updates must be easily accessible so that staff caneasily accessible so that staff can review such documents.review such documents. Restraining Orders:Restraining Orders:
  • 101. 101 They also must be kept well within theThey also must be kept well within the scope of your eyes only and not thescope of your eyes only and not the public’s. These types of sensitive legalpublic’s. These types of sensitive legal orders areorders are private and confidentialprivate and confidential,, therefore they should never betherefore they should never be POSTEDPOSTED in an area that could be viewed by nonin an area that could be viewed by non security or non management personnel.security or non management personnel. It is equally vital that these legalIt is equally vital that these legal notices arenotices are destroyeddestroyed once it isonce it is conveyed to you that the action hasconveyed to you that the action has closed.closed. Restraining Orders:Restraining Orders:
  • 102. 102 Chain of Command section:Chain of Command section:
  • 103. 103 A command hierarchy (chain of command) is a group of people dedicated to carrying out orders "from the top", that is, of authority. It is part of a power structure. A chain of command is vital to maintaining communication and discipline within the ranks. Chain of CommandChain of Command
  • 104. 104 In general,In general, security supervisorssecurity supervisors andand securitysecurity managersmanagers give orders only to those directlygive orders only to those directly below them in the chain of command andbelow them in the chain of command and receive orders only from those directly abovereceive orders only from those directly above them. A security officer who has difficultythem. A security officer who has difficulty executing a duty or order and appeals forexecuting a duty or order and appeals for relief directly above his immediaterelief directly above his immediate supervisor/ manager in the chain ofsupervisor/ manager in the chain of command is likely to be disciplined and orcommand is likely to be disciplined and or written up for not observing the chain ofwritten up for not observing the chain of command structure.command structure. Chain of CommandChain of Command
  • 105. 105 Security personnel who have a direct supervisor should report only to that individual and only that individual on all matters relevantrelevant to the operational objectives of your security program. Staff personnel who feel they are have been wronged and see no immediate remedy to the problem are welcome to then go further up the chain to solve the issue. Chain of CommandChain of Command
  • 106. 106 Although there is an established chain of command just about anywhere you go in the working world, that does not mean that front line personnel can’t have some type of reasonable communication with upper management that is above your direct supervisor. Communication with all levels of the power structure are actually strongly encouraged. Chain of CommandChain of Command
  • 107. 107 It is disagreements and the complaint process that becomes the problem when subordinates do not adhere to the chain of command and respect their supervisors. The key word here being, respect. If a supervisor has made what appears to be a correct decision or is reasonably enforcing any particular rule or procedure, then you do not- Chain of CommandChain of Command
  • 108. 108 -have the right to start going to all kinds of people above that supervisor and making waves about something you have no clear standing on. Basically, if you “don’t get your way” on any given issue and you think going way above your supervisor or manager is the solution, then your sorely mistaken and you will be disciplined for your conduct. Chain of CommandChain of Command
  • 109. 109 Chain of CommandChain of Command The “Client”The “Client”
  • 110. 110 “If I don’t get my way, I will just run to the client and complain to them. They like me, I have been here for years. I will show them!”….That method may work temporarily, but in the long term your setting yourself up for termination. Absolutely under no circumstances will any security personnel circumvent the chain of command and go to the client. Chain of CommandChain of Command
  • 111. 111 Certain select management team members in contract security communicate directly with the client team at your facility regarding operational issues, objectives, planning, procedures, and staff concerns. Those officials consist of the account manager, assistant account manager, the district manager, and or branch mgr. Chain of CommandChain of Command
  • 112. 112 Do we in management expect you to effectively communicate with your client team members and maintain a healthy working relationship? Yes of course we do!! It is matters of disagreement or tension among the ranks that can not be exposed to any client team member. They do not get involved in internal matters. Chain of CommandChain of Command
  • 113. 113 If you choose to continually ignore the chain of command or you have a habit of running to the client on matters that are meant to be handled by your direct supervisors, then you will be purged from the employee roster. Put simply, you will be terminated and we always want to avoid that scenario~
  • 114. 114 Access control perspective from theAccess control perspective from the Sears Tower Security Director:Sears Tower Security Director:
  • 115. 115 Excerpts from the May 2007Excerpts from the May 2007 edition ofedition of Security ManagementSecurity Management
  • 116. 116 Excerpts from theExcerpts from the May 2007May 2007 edition ofedition of Security ManagementSecurity Management Chicago’s Sears Tower,Chicago’s Sears Tower, at a height ofat a height of 1,454 feet1,454 feet to its architectural top, is theto its architectural top, is the tallest building in the United States and atallest building in the United States and a leading symbol of U.S. commerce. Afterleading symbol of U.S. commerce. After the collapse of the World Trade Center,the collapse of the World Trade Center, the former management was concernedthe former management was concerned about the Sears Tower’s prominence as aabout the Sears Tower’s prominence as a terrorist target andterrorist target and hardenedhardened securitysecurity accordingly.accordingly.
  • 117. 117 Excerpts from theExcerpts from the May 2007May 2007 edition ofedition of Security ManagementSecurity Management However, tenants were unhappy. SixHowever, tenants were unhappy. Six years out fromyears out from 9-119-11, the building, which, the building, which is under new ownership, hasis under new ownership, has considerably revamped the securityconsiderably revamped the security program it inherited to create a robustlyprogram it inherited to create a robustly secure but subtlesecure but subtle environment thatenvironment that does not make tenants feel like theydoes not make tenants feel like they work in a fortress.work in a fortress.
  • 118. 118 Excerpts from theExcerpts from the May 2007May 2007 edition ofedition of Security ManagementSecurity Management ““When Sears Tower Management Group tookWhen Sears Tower Management Group took over…[the goal was to] strike the balanceover…[the goal was to] strike the balance between goodbetween good customer servicecustomer service andand greatgreat securitysecurity,”,” says Sears Tower Managementsays Sears Tower Management Director of Security and Life SafetyDirector of Security and Life Safety Keith L.Keith L. KambicKambic, CPP., CPP. Kambic elaborates : “A high rise is a businessKambic elaborates : “A high rise is a business entity, and we can protect it all we want, but if weentity, and we can protect it all we want, but if we don’t get new tenants in here, then it’s an emptydon’t get new tenants in here, then it’s an empty building. It really does us no good.”building. It really does us no good.”
  • 119. 119 Excerpts from theExcerpts from the May 2007May 2007 edition ofedition of Security ManagementSecurity Management When Kambic joined the Sears Tower securityWhen Kambic joined the Sears Tower security team in 2004, he says, it was still responding toteam in 2004, he says, it was still responding to the 2001 attacks withthe 2001 attacks with “the hard approach”,“the hard approach”, thethe approach that occurred for most buildings rightapproach that occurred for most buildings right after 9-11. The security officers were in hardafter 9-11. The security officers were in hard uniforms that mimicked Chicago police;uniforms that mimicked Chicago police; customer servicecustomer service was not a priority; and thewas not a priority; and the fronts of our lobbies were filled with x-ray andfronts of our lobbies were filled with x-ray and metal detection machines. So as soon as youmetal detection machines. So as soon as you walked in, that was the first thing that you saw.”walked in, that was the first thing that you saw.”
  • 120. 120 ““Striking the balance”Striking the balance” Now, however, security’s approach isNow, however, security’s approach is moremore subtlesubtle.. There’s a package-screeningThere’s a package-screening machine off to one side of the lobby, butmachine off to one side of the lobby, but there is no lengthy queue behind it.there is no lengthy queue behind it. Employees flow in unimpeded; visitorsEmployees flow in unimpeded; visitors pass quickly through a metal detectorpass quickly through a metal detector before using access control cards at abefore using access control cards at a series of decorative turnstiles to reach theseries of decorative turnstiles to reach the elevators.elevators. VisitorsVisitors are able to check in at aare able to check in at a reception desk staffed by customerreception desk staffed by customer service agents inservice agents in business-style uniforms.business-style uniforms.
  • 121. 121 ““Striking the balance”Striking the balance” Training.Training. The state of Illinois requires thatThe state of Illinois requires that security officers have 20 hours of training beforesecurity officers have 20 hours of training before coming on site; Kambic requires an additional 16coming on site; Kambic requires an additional 16 hours. Once on the job, security staff participatehours. Once on the job, security staff participate in a formalized and documentedin a formalized and documented trainingtraining programprogram tailored by Kambic and the securitytailored by Kambic and the security contractor specifically for the Sears Tower site.contractor specifically for the Sears Tower site. In addition, they receive training from severalIn addition, they receive training from several agencies, including the FBI; the Secret Service;agencies, including the FBI; the Secret Service; the Bureau of Alcohol, Tobacco, Firearms, andthe Bureau of Alcohol, Tobacco, Firearms, and Explosives; and the Chicago Police and FireExplosives; and the Chicago Police and Fire Departments.Departments.
  • 122. 122 Customer Service aspects:Customer Service aspects: One module of the officer training is aOne module of the officer training is a thorough grounding inthorough grounding in customer servicecustomer service.. “In high rises, service is your biggest“In high rises, service is your biggest amenity. That’s one of the reasons thatamenity. That’s one of the reasons that they choose your building.”they choose your building.” This idea is reflected in the change fromThis idea is reflected in the change from police-type uniforms to morepolice-type uniforms to more corporatecorporate uniform attireuniform attire..
  • 123. 123 Customer Service aspects:Customer Service aspects: The new look for officers includes navy-The new look for officers includes navy- blue suits, shirts, and silk ties. On the firstblue suits, shirts, and silk ties. On the first day the officers wore their new uniforms,day the officers wore their new uniforms, KambicKambic recalls, favorable tenantrecalls, favorable tenant comments rolled in. “It’s more than just acomments rolled in. “It’s more than just a look. And I think the officerslook. And I think the officers felt betterfelt better about themselves; they feltabout themselves; they felt moremore professionalprofessional.”.”
  • 124. 124 Customer Service aspects:Customer Service aspects: Previously, says Kambic, officers rarelyPreviously, says Kambic, officers rarely greetedgreeted tenants and guests. “Now we want our officerstenants and guests. “Now we want our officers to make eye-contact, give a nod or a smile—to make eye-contact, give a nod or a smile— something so that thesomething so that the tenant feels recognizedtenant feels recognized.”.” Ideally, a tenant or visitor could have contactIdeally, a tenant or visitor could have contact with securitywith security three timesthree times before they reach thebefore they reach the elevator bank.elevator bank. ““The bottom line is that, in a high rise, securityThe bottom line is that, in a high rise, security staff provide thestaff provide the first impressionfirst impression when peoplewhen people walk in and thewalk in and the last impressionlast impression when peoplewhen people walk out,” Kambic states.walk out,” Kambic states.
  • 125. 125 ADA Act of 1990- 2010 UpdateADA Act of 1990- 2010 Update
  • 126. 126 2010 Update- Service Animals2010 Update- Service Animals
  • 127. 127 2010 Update- Service Animals2010 Update- Service Animals As professional and corporate securityAs professional and corporate security personnel, it is prudent that your fullypersonnel, it is prudent that your fully knowledgeable on building regulationsknowledgeable on building regulations concerning the entry and denying entry ofconcerning the entry and denying entry of individuals who have service animals. It isindividuals who have service animals. It is equally important to know what questionsequally important to know what questions can be asked and what can not be askedcan be asked and what can not be asked of individuals when they enter your lobbyof individuals when they enter your lobby with a service animal.with a service animal.
  • 128. 128 2010 Update- Service Animals2010 Update- Service Animals Federal ADA (Americans w/ DisabilitiesFederal ADA (Americans w/ Disabilities Act) Service Animals- The specifics:Act) Service Animals- The specifics:
  • 129. 129 2010 Update- Service Animals2010 Update- Service Animals TheThe Department of JusticeDepartment of Justice publishedpublished revised final regulations implementing therevised final regulations implementing the Americans with Disabilities ActAmericans with Disabilities Act (ADA) for(ADA) for title II (State and local governmenttitle II (State and local government services) and title III (publicservices) and title III (public accommodations and commercialaccommodations and commercial facilities) on September 15, 2010, in thefacilities) on September 15, 2010, in the Federal Register. These requirements, orFederal Register. These requirements, or rules, clarify and refine issues that haverules, clarify and refine issues that have arisen over the pastarisen over the past 20 years20 years and containand contain new, and updated requirements.new, and updated requirements.
  • 130. 130 2010 Update- Service Animals2010 Update- Service Animals 1. Beginning on March 15, 2011, only dogs are recognized as service animals under titles II and III of the ADA. 2. A service animal is a dog that is individually trained to do work or perform tasks for a person with a disability. 3. Generally speaking, title II and title III entities must permit service animals to accompany people with disabilities in all areas where members of the public are allowed to go.
  • 131. 131 Service Animals Defined:Service Animals Defined: Service animals are defined as dogs that are individually trained to do work or perform tasks for people with disabilities. Examples of such work or tasks include guiding people who are blind, alerting people who are deaf, pulling a wheelchair, alerting and protecting a person who is having a seizure, reminding a person with mental illness to take prescribed medications, calming a person with Post Traumatic Stress Disorder (PTSD) during an anxiety attack, or performing other duties. Service animals are working animals, not pets. The work or task a dog has been trained to provide must be directly related to the person’s disability. Dogs whose sole function is to provide comfort or emotional support do not qualify as service animals under the ADA.
  • 132. 132 Service Animals Defined:Service Animals Defined: This definition does not affect or limit the broader definition of “assistance animal” under the Fair Housing Act or the broader definition of “service animal” under the Air Carrier Access Act. Some State and local laws also define service animal more broadly than the ADA does. Information about such laws can be obtained from the origin State attorney general’s office.
  • 133. 133 Service Animals Defined:Service Animals Defined: Under the ADA, State and local governments, businesses, and nonprofit organizations that serve the public generally must allow service animals to accompany people with disabilities in all areas of the facility where the public is normally allowed to go.
  • 134. 134 Service Animals Defined:Service Animals Defined: For example, in a hospital it would be inappropriate to exclude a service animal from areas such as patient rooms, clinics, cafeterias, or examination rooms. However, it may be appropriate to exclude a service animal from operating rooms or burn units where the animal’s presence may compromise a sterile environment.
  • 135. 135 Service Animals- Control:Service Animals- Control: Under the ADA, service animals must be harnessed, leashed, or tethered, unless these devices interfere with the service animal’s work or the individual’s disability prevents using these devices. In that case, the individual must maintain control of the animal through voice, signal, or other effective controls.
  • 136. 136 Asking Questions. Be careful.Asking Questions. Be careful.
  • 137. 137 Service Animals- Questions:Service Animals- Questions: When it is not obvious what service an animal provides, only limited inquiries are allowed. Staff may ask two questions: (1) is the dog a service animal required because of a disability.
  • 138. 138 Service Animals- Questions:Service Animals- Questions: (2) what work or task has the dog been trained to perform. Staff cannot ask about the person’s disability, require medical documentation, require a special identification card or training documentation for the dog, or ask that the dog demonstrate its ability to perform the work or task.
  • 139. 139 Service Animals- Questions:Service Animals- Questions: Allergies and fear of dogs are not valid reasons for denying access or refusing service to people using service animals. Affected parties both should be accommodated by assigning them, if possible, to different locations within the room or different rooms in the facility.
  • 140. 140 Service Animals- Questions:Service Animals- Questions: A person with a disability cannot be asked to remove his service animal from the premises unless: (1) the dog is out of control and the handler does not take effective action to control it or (2) the dog is not housebroken. When there is a legitimate reason to ask that a service animal be removed, staff must offer the person with the disability the opportunity to obtain goods or services without the animal’s presence.
  • 141. 141 Service Animals- Questions:Service Animals- Questions: Establishments that sell or prepare food within your building facility, no matter how expansive or limited, must allow service animals in public areas even if state or local health codes prohibit animals on the premises.
  • 142. 142 Service Animals- Questions:Service Animals- Questions:  People with disabilities who use service animals cannot be isolated from other people or treated less favorably than other people.  Staff are not required to provide care or food for a service animal.
  • 143. 143 ~The Sears Tower Lobby~~The Sears Tower Lobby~ (What do you notice in this picture?)(What do you notice in this picture?)
  • 144. 144 YourYour main lobby.main lobby. The nerve centerThe nerve center of your entire security programof your entire security program
  • 145. 145 Always takeAlways take PridePride in your buildingin your building lobbies and keep them clean!lobbies and keep them clean!
  • 146. 146 Access Control measures will alwaysAccess Control measures will always includeinclude “Tenant”“Tenant” door checks.door checks. Make sure tenant space isMake sure tenant space is secured.secured.
  • 147. 147 That includesThat includes exteriorexterior entrances &entrances & common areas of your facilitycommon areas of your facility
  • 148. 148 Effective access control starts with greatEffective access control starts with great Customer Service…Customer Service…
  • 149. 149 ……and not treating visitors or employees likeand not treating visitors or employees like they are at an armed checkpoint.they are at an armed checkpoint.
  • 150. 150 Protecting your client’s building &Protecting your client’s building & employees is one of youremployees is one of your primaryprimary priorities.priorities. Providing exceptionalProviding exceptional customer servicecustomer service to those sameto those same employees and visitors is equally asemployees and visitors is equally as important.important.
  • 151. 151 Personnel should maintain a neat,Personnel should maintain a neat, clean, and visually attractive front desk.clean, and visually attractive front desk.
  • 153. 153 Security staff personnel should on aSecurity staff personnel should on a periodic basis make visualperiodic basis make visual inspections of theinspections of the building exteriorbuilding exterior toto note any evident damage, crackednote any evident damage, cracked glass, vandalism, or windowglass, vandalism, or window obstructions.obstructions.
  • 154. 154 ““Secondary”Secondary” entrances are just asentrances are just as important as yourimportant as your primaryprimary entrance.entrance. All entrances deserve equal scrutiny and careAll entrances deserve equal scrutiny and care
  • 155. 155 If your building has a standard practice of flying theIf your building has a standard practice of flying the American flag, then the proper protocols should beAmerican flag, then the proper protocols should be followed with respect to when you lower & raise it.followed with respect to when you lower & raise it.
  • 156. 156 Take Pride in your uniform and yourselfTake Pride in your uniform and yourself
  • 157. 157 All members of the building Mgt. TeamAll members of the building Mgt. Team are responsible forare responsible for safety & qualitysafety & quality..
  • 158. 158 ~Striving to be the~Striving to be the “Best”“Best” starts with beingstarts with being Well Trained, Alert, & KnowledgeableWell Trained, Alert, & Knowledgeable
  • 159. 159 The beginning of this presentation askedThe beginning of this presentation asked “How“How high can we reach?”high can we reach?” The answer is simple.The answer is simple.
  • 160. 160 As high as we want~As high as we want~
  • 162. 162 Thank you for attending today’sThank you for attending today’s presentation on access controlpresentation on access control
  • 163. 163