security in the courthouse south carolina clerks of court and master of deeds annual conference...

Post on 26-Mar-2015

216 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Security In The Security In The CourthouseCourthouse

South CarolinaSouth CarolinaClerks of Court and Master of Deeds Clerks of Court and Master of Deeds

Annual ConferenceAnnual Conference

Presented byPresented byHarold C. Gillens, PSP, CFC, CHS-Harold C. Gillens, PSP, CFC, CHS-

IIIIII

IntroductionIntroduction

Security Best Practices indicate that we Security Best Practices indicate that we should transition from being a REACTIVE should transition from being a REACTIVE Society to a PROACTIVE SocietySociety to a PROACTIVE Society Are you focused on PREPAREDNESS & PREVENTION?Are you focused on PREPAREDNESS & PREVENTION?

AgendaAgenda Security Standards & GuidelinesSecurity Standards & Guidelines Self Assessment / Security AuditSelf Assessment / Security Audit Security & Emergency PlanningSecurity & Emergency Planning The Security Architect/Consultant’s RoleThe Security Architect/Consultant’s Role ConclusionConclusion

Security Standards & Security Standards & GuidelinesGuidelines

Standard & GuidelinesStandard & Guidelines(Security Best Practices)(Security Best Practices)

Administrator’s Office Directives/OrderAdministrator’s Office Directives/Order Mission – Protecting People, Property, and InformationMission – Protecting People, Property, and Information

Directive/Order CoverageDirective/Order Coverage Daily Security ProceduresDaily Security Procedures Procedures to Protect The Pubic & Court StaffProcedures to Protect The Pubic & Court Staff Courthouse Staff SecurityCourthouse Staff Security Security of Judicial OfficersSecurity of Judicial Officers Security EquipmentSecurity Equipment Security PlanningSecurity Planning Courthouse Design/Build & Remodeling Courthouse Design/Build & Remodeling

ConsiderationsConsiderations Security Checklist/AssessmentsSecurity Checklist/Assessments

SC Order of the Chief SC Order of the Chief JusticeJustice

Order # 2005-08-31-01Order # 2005-08-31-01 Established – Court Security CommitteeEstablished – Court Security Committee Required the Development of a Comprehensive Required the Development of a Comprehensive

Security ChecklistSecurity Checklist Required A Security Audit to be PerformedRequired A Security Audit to be Performed Required the Development of a Security PlanRequired the Development of a Security Plan

Order # 2006-08-04-01Order # 2006-08-04-01 Stated - Comprehensive Checklist delivered to Stated - Comprehensive Checklist delivered to

Committee Committee Committee to perform Security AuditCommittee to perform Security Audit Security Plan to be delivered by October 30Security Plan to be delivered by October 30,, 2006 2006

SC Order of the Chief SC Order of the Chief JusticeJustice

Order # 2012-03-28-01Order # 2012-03-28-01 Required the Security Committee and Required the Security Committee and

Security Manager to review the Security Plan Security Manager to review the Security Plan for compliance and identify security needs.for compliance and identify security needs.

Report the status of the plan and security Report the status of the plan and security needs to the State Court Administrator by needs to the State Court Administrator by June 15, 2012June 15, 2012

SC Code of LawsSC Code of LawsSCLEA 26.1, 2, 3SCLEA 26.1, 2, 3

SC Code of Laws Section 23-15-80SC Code of Laws Section 23-15-80 Sheriff or their deputies shall attend all Sheriff or their deputies shall attend all

circuit court and enforce the courts circuit court and enforce the courts established rulesestablished rules

SC Law Enforcement Accreditation SC Law Enforcement Accreditation Manual Chapter 26Manual Chapter 26 Sections 26.1, 26.2 and 26.3 – Established Sections 26.1, 26.2 and 26.3 – Established

Standards for the Agency responsible for Standards for the Agency responsible for security within the courtroom, courthouse security within the courtroom, courthouse itself or both.itself or both.

Self Assessment/Security Self Assessment/Security AuditAudit

Physical Security ChecklistPhysical Security Checklist(Security Best Practices)(Security Best Practices)

Perimeter Fencing & GatesPerimeter Fencing & Gates Perimeter LightingPerimeter Lighting LandscapingLandscaping Parking AreasParking Areas Windows, Doors, and Other OpeningWindows, Doors, and Other Opening Ceilings and Walls Ceilings and Walls (true floor to ceiling)(true floor to ceiling)

Alarm Systems Alarm Systems (intrusion detection devices)(intrusion detection devices)

Crawl Space and HVAC Ducting Access Control Crawl Space and HVAC Ducting Access Control (tamper protection)(tamper protection)

Elevator Controls Elevator Controls (Card Access or Key Control)(Card Access or Key Control)

Public Areas Public Areas (restrooms, waiting rooms, etc.)(restrooms, waiting rooms, etc.)

Offices Handling MoneyOffices Handling Money Daily Courthouse ProceduresDaily Courthouse Procedures Courthouse ProceduresCourthouse Procedures

SAMPLE Comprehensive SAMPLE Comprehensive ChecklistChecklist

SEE HANDOUTSSEE HANDOUTS

Security & Emergency Security & Emergency PlanningPlanning

Court Security Plan Court Security Plan (The Proactive Approach)(The Proactive Approach)

(Security Best Practices)(Security Best Practices)

General Security ElementsGeneral Security Elements Mail HandlingMail Handling ID and Access ControlID and Access Control Parking PlanParking Plan Interior/Exterior Lighting PlanInterior/Exterior Lighting Plan Intrusion/Panic Alarm SystemsIntrusion/Panic Alarm Systems Fire Detection/EquipmentFire Detection/Equipment Emergency/Auxiliary PowerEmergency/Auxiliary Power Private Security ContractorsPrivate Security Contractors Administrative/Clerk’s Office SecurityAdministrative/Clerk’s Office Security Jury Personnel/Jury RoomJury Personnel/Jury Room

Court Security Plan Court Security Plan (The Proactive Approach)(The Proactive Approach)

(Security Best Practices)(Security Best Practices)

General Security Elements General Security Elements (Continues)(Continues) Public DemonstrationsPublic Demonstrations Vital Records StorageVital Records Storage Evacuation PlanningEvacuation Planning After-Hours OperationsAfter-Hours Operations Custodial ServicesCustodial Services Computer and Data SecurityComputer and Data Security Workplace ViolenceWorkplace Violence

Court Security Plan Court Security Plan (The Proactive Approach)(The Proactive Approach)

(Security Best Practices)(Security Best Practices)

Operational Security ElementsOperational Security Elements Security Personnel and StaffingSecurity Personnel and Staffing Perimeter and Entry ScreeningPerimeter and Entry Screening Prisoner/Inmate TransportPrisoner/Inmate Transport Holding CellsHolding Cells Interior and Public Waiting AreasInterior and Public Waiting Areas Courtroom SecurityCourtroom Security Jury Trial ProceduresJury Trial Procedures High Risk/High Profile TrialsHigh Risk/High Profile Trials Judicial ProtectionJudicial Protection Incident Reporting and RecordingIncident Reporting and Recording Security Personnel/Staff TrainingSecurity Personnel/Staff Training Courthouse CommunicationCourthouse Communication Bomb ThreatsBomb Threats

Court Security Plan Court Security Plan (The Proactive Approach)(The Proactive Approach)

(Security Best Practices) (Security Best Practices)

Operational Security Elements Operational Security Elements (continues)(continues) Hostage/Escape/Lockdown/Active Shooter ProceduresHostage/Escape/Lockdown/Active Shooter Procedures Firearms Policies and ProceduresFirearms Policies and Procedures Restraint of DefendantsRestraint of Defendants

The Security The Security Architect / Architect /

Consultant’s RoleConsultant’s Role

Security Committee SupportSecurity Committee Support Are your Security Committee equipped to develop Are your Security Committee equipped to develop

and support every element of your Security Plan?and support every element of your Security Plan? Keep in Mind – This is a Collateral Duty for every Keep in Mind – This is a Collateral Duty for every

member member (focus and time management)(focus and time management)

Here are some elements they may require Here are some elements they may require assistance with:assistance with:

Risk and Vulnerability Assessments / Security AuditsRisk and Vulnerability Assessments / Security Audits Electronic Systems Design and Installation ManagementElectronic Systems Design and Installation Management

(Access Control, Intrusion Detection, IP Video Management/CCTV, (Access Control, Intrusion Detection, IP Video Management/CCTV, Parking Control, Mass Notification, and Intercom Systems)Parking Control, Mass Notification, and Intercom Systems)

Workplace Violence Awareness & TrainingWorkplace Violence Awareness & Training Design Build & Renovation – Security Architect SupportDesign Build & Renovation – Security Architect Support

New Courthouse Design/Build New Courthouse Design/Build & The Security Architect& The Security Architect

Is a Courthouse in your 3 to 5 year Master Plan? Is a Courthouse in your 3 to 5 year Master Plan? Who is the 1Who is the 1stst person you will hire in your person you will hire in your

design/build process?design/build process? How will you address security during your How will you address security during your

design/build process?design/build process? Require your Architect to have a Security Planner on Require your Architect to have a Security Planner on

staff?staff? Hire a Security Planner directly?Hire a Security Planner directly? Tell the General Contractor to “throw” something in?Tell the General Contractor to “throw” something in? Implement your security requirements after the Implement your security requirements after the

building has been built?building has been built?

The Architect The Architect versus General versus General

ContractorContractor Architect’s RoleArchitect’s Role

Direct End-User SupportDirect End-User Support Facility Programing of interior and exterior spacesFacility Programing of interior and exterior spaces Design ServicesDesign Services Specification DevelopmentSpecification Development Support Bid Process and GC SelectionSupport Bid Process and GC Selection Construction management supportConstruction management support

GC’s RoleGC’s Role Material Procurement and Construction per SpecsMaterial Procurement and Construction per Specs Construction ManagementConstruction Management

Security Consultants Security Consultants versus Systems Integratorversus Systems Integrator

Consultant’s RoleConsultant’s Role Direct End-User Support Direct End-User Support (Physical & Electronic Security)(Physical & Electronic Security)

Facility Programing of interior and exterior spacesFacility Programing of interior and exterior spaces Security DesignSecurity Design Specification DevelopmentSpecification Development Support Bid Process and Integrator SelectionSupport Bid Process and Integrator Selection Installation management supportInstallation management support

Integrator’s RoleIntegrator’s Role Equipment Sales, Procurement and Installation per Equipment Sales, Procurement and Installation per

SpecsSpecs

When Do I Need A When Do I Need A ConsultantConsultant

A consultant is typically used under the following conditions:A consultant is typically used under the following conditions: Additional Subject Mater Expertise is RequiredAdditional Subject Mater Expertise is Required

An Independent or Non-Bias Opinion is DesiredAn Independent or Non-Bias Opinion is Desired

The effort is too labor intensive for a collateral dutyThe effort is too labor intensive for a collateral duty

Outside your area of expertiseOutside your area of expertise

The Security Consultants job is to: The Security Consultants job is to: Provide his/her clients with current Best Practices in the industryProvide his/her clients with current Best Practices in the industry

Support Policy and Procedure DevelopmentSupport Policy and Procedure Development

Support Security Audits & Vulnerability AssessmentsSupport Security Audits & Vulnerability Assessments

Provide technology analysis and recommendation via spec developmentProvide technology analysis and recommendation via spec development

Provide project management support throughout the construction and/or Provide project management support throughout the construction and/or

installation phaseinstallation phase

Perform system validation and verification during commissioningPerform system validation and verification during commissioning

(MAKE THE CLIENT LOOK GOOD !!!)(MAKE THE CLIENT LOOK GOOD !!!)

Area of ExpertiseArea of Expertise

Security Consultants generally practice Security Consultants generally practice

these areas of expertise:these areas of expertise:

Workplace ViolenceWorkplace Violence

Emergency & Disaster PlanningEmergency & Disaster Planning

Security Management Security Management (i.e. Guard Force, Security Patrol, etc.)(i.e. Guard Force, Security Patrol, etc.)

Physical and Electronic Security Physical and Electronic Security (i.e. CCTV, ACS, IDS, etc.)(i.e. CCTV, ACS, IDS, etc.)

Cyber and Information Security Cyber and Information Security (INFOSEC)(INFOSEC)

Expert Witness Expert Witness (to support each of the above)(to support each of the above)

ConclusionsConclusions

Putting It All TogetherPutting It All Together

Transitioning from Reactive to ProactiveTransitioning from Reactive to Proactive Preparedness and Prevention only occurs with planning, Preparedness and Prevention only occurs with planning,

training and exercisestraining and exercises Security Standards and Best PracticesSecurity Standards and Best Practices

Policy & Procedure Development is always best from a Policy & Procedure Development is always best from a Top-Down ApproachTop-Down Approach

Policies & Procedures should change as your facility Policies & Procedures should change as your facility changeschanges

Security AuditsSecurity Audits Conduct Annual Security Assessments to identify gapsConduct Annual Security Assessments to identify gaps Emergency Planning should be re-enforced by training Emergency Planning should be re-enforced by training

and annual briefings and annual briefings (i.e. online training, webinars, etc.)(i.e. online training, webinars, etc.)

The Security Architect & ConsultantThe Security Architect & Consultant Select a consultant with expertise in areas required to Select a consultant with expertise in areas required to

cover security gapscover security gaps

Questions & DiscussionsQuestions & Discussions

Presented By:Presented By:

Harold C. Gillens, PSP, CFC, CHS-IIIHarold C. Gillens, PSP, CFC, CHS-IIIPresident / CEOPresident / CEOQuintech Security Consultants, Inc.Quintech Security Consultants, Inc.102 Sangaree Park Court102 Sangaree Park CourtSuite 4Suite 4Summerville, SC 29483Summerville, SC 29483v: 843.695.0170 c: 843.364.0169v: 843.695.0170 c: 843.364.0169www.quintechengineering.com hgillens@quintechengineering.com

top related