1 / 26

Security In The Courthouse

Security In The Courthouse. South Carolina Clerks of Court and Master of Deeds Annual Conference. Presented by Harold C. Gillens, PSP, CFC, CHS-III. Introduction. Security Best Practices indicate that we should transition from being a REACTIVE Society to a PROACTIVE Society

Download Presentation

Security In The Courthouse

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security In The Courthouse South Carolina Clerks of Court and Master of Deeds Annual Conference Presented by Harold C. Gillens, PSP, CFC, CHS-III

  2. Introduction Security Best Practices indicate that we should transition from being a REACTIVE Society to a PROACTIVE Society Are you focused on PREPAREDNESS & PREVENTION? Agenda Security Standards & Guidelines Self Assessment / Security Audit Security & Emergency Planning The Security Architect/Consultant’s Role Conclusion

  3. Security Standards & Guidelines

  4. Standard & Guidelines(Security Best Practices) Administrator’s Office Directives/Order Mission – Protecting People, Property, and Information Directive/Order Coverage Daily Security Procedures Procedures to Protect The Pubic & Court Staff Courthouse Staff Security Security of Judicial Officers Security Equipment Security Planning Courthouse Design/Build & Remodeling Considerations Security Checklist/Assessments

  5. SC Order of the Chief Justice Order # 2005-08-31-01 Established – Court Security Committee Required the Development of a Comprehensive Security Checklist Required A Security Audit to be Performed Required the Development of a Security Plan Order # 2006-08-04-01 Stated - Comprehensive Checklist delivered to Committee Committee to perform Security Audit Security Plan to be delivered by October 30, 2006

  6. SC Order of the Chief Justice Order # 2012-03-28-01 Required the Security Committee and Security Manager to review the Security Plan for compliance and identify security needs. Report the status of the plan and security needs to the State Court Administrator by June 15, 2012

  7. SC Code of LawsSCLEA 26.1, 2, 3 SC Code of Laws Section 23-15-80 Sheriff or their deputies shall attend all circuit court and enforce the courts established rules SC Law Enforcement Accreditation Manual Chapter 26 Sections 26.1, 26.2 and 26.3 – Established Standards for the Agency responsible for security within the courtroom, courthouse itself or both.

  8. Self Assessment/Security Audit

  9. Physical Security Checklist(Security Best Practices) Perimeter Fencing & Gates Perimeter Lighting Landscaping Parking Areas Windows, Doors, and Other Opening Ceilings and Walls (true floor to ceiling) Alarm Systems (intrusion detection devices) Crawl Space and HVAC Ducting Access Control (tamper protection) Elevator Controls (Card Access or Key Control) Public Areas (restrooms, waiting rooms, etc.) Offices Handling Money Daily Courthouse Procedures Courthouse Procedures

  10. SAMPLE Comprehensive Checklist SEE HANDOUTS

  11. Security & Emergency Planning

  12. Court Security Plan (The Proactive Approach)(Security Best Practices) General Security Elements Mail Handling ID and Access Control Parking Plan Interior/Exterior Lighting Plan Intrusion/Panic Alarm Systems Fire Detection/Equipment Emergency/Auxiliary Power Private Security Contractors Administrative/Clerk’s Office Security Jury Personnel/Jury Room

  13. Court Security Plan (The Proactive Approach)(Security Best Practices) General Security Elements (Continues) Public Demonstrations Vital Records Storage Evacuation Planning After-Hours Operations Custodial Services Computer and Data Security Workplace Violence

  14. Court Security Plan (The Proactive Approach)(Security Best Practices) Operational Security Elements Security Personnel and Staffing Perimeter and Entry Screening Prisoner/Inmate Transport Holding Cells Interior and Public Waiting Areas Courtroom Security Jury Trial Procedures High Risk/High Profile Trials Judicial Protection Incident Reporting and Recording Security Personnel/Staff Training Courthouse Communication Bomb Threats

  15. Court Security Plan (The Proactive Approach)(Security Best Practices) Operational Security Elements (continues) Hostage/Escape/Lockdown/Active Shooter Procedures Firearms Policies and Procedures Restraint of Defendants

  16. The Security Architect / Consultant’s Role

  17. Security Committee Support Are your Security Committee equipped to develop and support every element of your Security Plan? Keep in Mind – This is a Collateral Duty for every member (focus and time management) Here are some elements they may require assistance with: Risk and Vulnerability Assessments / Security Audits Electronic Systems Design and Installation Management(Access Control, Intrusion Detection, IP Video Management/CCTV, Parking Control, Mass Notification, and Intercom Systems) Workplace Violence Awareness & Training Design Build & Renovation – Security Architect Support

  18. New Courthouse Design/Build & The Security Architect Is a Courthouse in your 3 to 5 year Master Plan? Who is the 1st person you will hire in your design/build process? How will you address security during your design/build process? Require your Architect to have a Security Planner on staff? Hire a Security Planner directly? Tell the General Contractor to “throw” something in? Implement your security requirements after the building has been built?

  19. The Architect versus General Contractor Architect’s Role Direct End-User Support Facility Programing of interior and exterior spaces Design Services Specification Development Support Bid Process and GC Selection Construction management support GC’s Role Material Procurement and Construction per Specs Construction Management

  20. Security Consultants versus Systems Integrator Consultant’s Role Direct End-User Support (Physical & Electronic Security) Facility Programing of interior and exterior spaces Security Design Specification Development Support Bid Process and Integrator Selection Installation management support Integrator’s Role Equipment Sales, Procurement and Installation per Specs

  21. When Do I Need A Consultant A consultant is typically used under the following conditions: Additional Subject Mater Expertise is Required An Independent or Non-Bias Opinion is Desired The effort is too labor intensive for a collateral duty Outside your area of expertise The Security Consultants job is to: Provide his/her clients with current Best Practices in the industry Support Policy and Procedure Development Support Security Audits & Vulnerability Assessments Provide technology analysis and recommendation via spec development Provide project management support throughout the construction and/or installation phase Perform system validation and verification during commissioning (MAKE THE CLIENT LOOK GOOD !!!)

  22. Area of Expertise Security Consultants generally practice these areas of expertise: Workplace Violence Emergency & Disaster Planning Security Management (i.e. Guard Force, Security Patrol, etc.) Physical and Electronic Security (i.e. CCTV, ACS, IDS, etc.) Cyber and Information Security (INFOSEC) Expert Witness (to support each of the above)

  23. Conclusions

  24. Putting It All Together • Transitioning from Reactive to Proactive • Preparedness and Prevention only occurs with planning, training and exercises • Security Standards and Best Practices • Policy & Procedure Development is always best from a Top-Down Approach • Policies & Procedures should change as your facility changes • Security Audits • Conduct Annual Security Assessments to identify gaps • Emergency Planning should be re-enforced by training and annual briefings (i.e. online training, webinars, etc.) • The Security Architect & Consultant • Select a consultant with expertise in areas required to cover security gaps

  25. Questions & Discussions

  26. Presented By: Harold C. Gillens, PSP, CFC, CHS-III President / CEO Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 v: 843.695.0170 c: 843.364.0169 www.quintechengineering.com hgillens@quintechengineering.com

More Related