U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Security Design and Premises Protection (From Criminal and Civil Investigation Handbook, P 7-93 to 7-117, 1981, Joseph J Grau and Ben Jacobson, ed.- See NCJ-84274)

NCJ Number
84322
Author(s)
D E Zeldin; M B Zeldin
Date Published
1981
Length
25 pages
Annotation
Considerations for building security design and premises protection focus on physical design structure, building security measures, protective devices and services, and receiving, transferring, and merchandising security measures.
Abstract
In providing security in physical design, attention should be given to positioning the building on the site, landscaping, lighting, roof access, parking lots and delivery access, fencing, additional perimeter protection, the provision of employee lockers, stairwells and emergency exit doors, fire protection systems, and windows. Building security measures should focus on key control, opening the building, employee movement, employee identification devices, visitor control, and package control. Twenty-four-hour protection can be provided by alarm systems, guards, and guard dogs. Significant losses can be curtailed by using procedures that restrict employee personal use of telephones for long-distance calls and regulate employee use of company products. Because the receiving-shipping, transferring, and merchandising areas provide the working nucleus of any business establishment, security measures must be applied in these areas if loss and shrinkage are to be minimized. Although securing such areas involves many phases, it is essential that a protection program begin with a consideration of the physical characteristics of these areas as well as the surrounding entrances, corridors, etc. Consideration should also be given to the placement of cashiers so that they are accessible, easily observed, yet secure against attacks from pilferers. Eighteen methods of employee dishonesty are briefly described.