U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Security Survey (From Museum, Archive, and Library Security, P 505-555, 1983, by Lawrence J Fennelly - See NCJ-87831)

NCJ Number
87842
Author(s)
L J Fennelly; L A Tyska
Date Published
1983
Length
51 pages
Annotation
The improvement of security measures and the reduction of criminal opportunity for a facility must be based in a crime analysis for the community in which the facility is located and a security survey that focuses on the adequacy of target hardening and security procedures.
Abstract
Crime analysis consists of crime data collection, crime data collation, data analysis, dissemination of analysis reports, and feedback and evaluation of crime data. This process provides the risk factor upon which to set the degree of security required for the facility. Crime statistics should be collected as a first step in designing a prevention program and be maintained throughout the program on a daily basis and summarized monthly. Data should include the location of the incident, the date, time, how entry was made, type of property taken, property identification, dollar amount taken, how entry was reported, point of entry, occupancy status, instrument used for entry, street and exterior lights, lighting at points of entry, alarm systems, status of the alarm, and when detected. The security survey is a 'critical onsite examination and analysis of an industrial plant, business or home, public or private institution to ascertain the present security status, to identify deficiencies or excesses, to determine the protection needed, and to make recommendations to improve the security.' A consultant called in to conduct a security survey should meet with management at least twice to define the objectives, goals, and scope of the security inspection and to describe the finished report and review recommendations. The final step is to evaluate the survey's effectiveness after the clients have reviewed it and implemented the security changes recommended. The broad areas to be covered in the survey are the facility, perimeter security, procedures, emergency action plan and contingency plans, and artifact protection. The appendixes discuss perimeter protection; lighting and security; locks and key control; files, safes, and vaults; intrusion alarms; and security surveys for libraries.

Downloads

No download available

Availability