Essentials Magazine Essentials Spring 2018 - Page 10

Perkins + Will, Dena’ina Elementary School. Wasilla, Alaska. Photo Credit: Kevin G. Smith Photography ogy-based reporting, and a means to report anonymously. • Ensure there are effective communications protocols to transmit information in a timely fashion. • Develop security staffing programs that are dedicated to campus or schools with specific duties. • Develop student participation programs that allow students to report in real time to security and/or administrative staff. • Utilize “day time” alarm monitoring of emergency egress doors and other low traffic areas to provide security with the maximum time of intervention of a potential criminal act. • Utilize hand-held technologies such as tablets and smartphones to provide security staff with real time video and alarm conditions. • Develop communications and greeting procedures for first responders to provide response directions and access to areas as needed. • Manage security review programs to ensure all physical security components are functioning. In addition to the potential threats that originate beyond the borders of the school campus, we need to recognize that many dangerous situations are caused by those on campus everyday — namely the students themselves. Fighting and bullying should be considered when organizing a comprehensive school safety plan. A recent study from the National Center for Education Statistics found that students age 12-18 reported most incidents of bullying take place in transitional areas between classrooms such as hallways and stairwells. In instances like these, transparent design that utilizes glass and clear lines of sight can help to diminish opportunities for bullying. While the physical environment and technological solutions are critical in security solutions, we cannot underestimate the incredible importance of human relationships. Our best school leaders understand the critical need for every student to have a meaningful relationship with at least one adult in the building. These relationships make it more likely that negative changes in behavior will be 10j essentials | spring 2018 10j essentials | spring 2018 ogy-based reporting, and a means to report anonymously. • Ensure there are effective com- munications protocols to transmit information in a timely fashion. • Develop security staffing pro- grams that are dedicated to campus or schools with specific duties. • Develop student participation programs that allow students to report in real time to security and/or adminis- trative staff. • Utilize “day time” alarm monitor- ing of emergency egress doors and oth- er low traffic areas to provide security with the maximum time of intervention of a potential criminal act. • Utilize hand-held technologies such as tablets and smartphones to pro- vide security staff with real time video and alarm conditions. • Develop communications and greeting procedures for first respond- ers to provide response directions and access to areas as needed. • Manage security review programs to ensure all physical security compo- nents are functioning. In addition to the potential threats FB&vFR&WBFR&&FW'2`FR666W2vRVVBF&V6rЦ旦RFBFvW&W26GVF2&P6W6VB'F6R6W2WfW'F( BVǒFR7GVFVG2FV6VfW2fvFrB'Vǖr6VB&R66BЦW&VBvV&v旦r6&VV6fP666fWG&V6VB7GVGg&ЧFRF6VFW"f"VGV6F7FF7F72fVBFB7GVFVG2vR"&W'FVB7B6FVG2b'VǖpFR6RG&6F&V2&WGvVV677&27V62v2B7F"ЧvV27F6W2ƖRFW6RG&2Ч&VBFW6vFBWFƗW2v72@6V"ƖW2b6vB6VFF֖6'GVFW2f"'VǖrvRFR66Vf&VB@FV6v66WF2&R7&F66RЦ7W&G6WF2vR6BVFW&W7FFPFR7&VF&R'F6RbV&VF62W"&W7B66VFW'0VFW'7FBFR7&F6VVBf"WfW'7GVFVBFfRVvgV&VF6vFBV7BRGVBFR'VFrFW6R&VF62RB&RƖVǐFBVvFfR6vW2&Vf"v&P