Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security In The Courthouse South Carolina Clerks of Court and Master of Deeds Annual Conference Presented by Harold C. Gillens, PSP, CFC, CHS-III.

Similar presentations


Presentation on theme: "Security In The Courthouse South Carolina Clerks of Court and Master of Deeds Annual Conference Presented by Harold C. Gillens, PSP, CFC, CHS-III."— Presentation transcript:

1 Security In The Courthouse South Carolina Clerks of Court and Master of Deeds Annual Conference Presented by Harold C. Gillens, PSP, CFC, CHS-III

2 Introduction Security Best Practices indicate that we should transition from being a REACTIVE Society to a PROACTIVE Society Security Best Practices indicate that we should transition from being a REACTIVE Society to a PROACTIVE Society Are you focused on PREPAREDNESS & PREVENTION? Are you focused on PREPAREDNESS & PREVENTION? Agenda Agenda Security Standards & Guidelines Security Standards & Guidelines Self Assessment / Security Audit Self Assessment / Security Audit Security & Emergency Planning Security & Emergency Planning The Security Architect/Consultants Role The Security Architect/Consultants Role Conclusion Conclusion

3 Security Standards & Guidelines

4 Standard & Guidelines (Security Best Practices) Administrators Office Directives/Order Administrators Office Directives/Order Mission – Protecting People, Property, and Information Mission – Protecting People, Property, and Information Directive/Order Coverage Directive/Order Coverage Daily Security Procedures Daily Security Procedures Procedures to Protect The Pubic & Court Staff Procedures to Protect The Pubic & Court Staff Courthouse Staff Security Courthouse Staff Security Security of Judicial Officers Security of Judicial Officers Security Equipment Security Equipment Security Planning Security Planning Courthouse Design/Build & Remodeling Considerations Courthouse Design/Build & Remodeling Considerations Security Checklist/Assessments Security Checklist/Assessments

5 SC Order of the Chief Justice Order # Order # Established – Court Security Committee Established – Court Security Committee Required the Development of a Comprehensive Security Checklist Required the Development of a Comprehensive Security Checklist Required A Security Audit to be Performed Required A Security Audit to be Performed Required the Development of a Security Plan Required the Development of a Security Plan Order # Order # Stated - Comprehensive Checklist delivered to Committee Stated - Comprehensive Checklist delivered to Committee Committee to perform Security Audit Committee to perform Security Audit Security Plan to be delivered by October 30, 2006 Security Plan to be delivered by October 30, 2006

6 SC Order of the Chief Justice Order # Order # Required the Security Committee and Security Manager to review the Security Plan for compliance and identify security needs. Required the Security Committee and Security Manager to review the Security Plan for compliance and identify security needs. Report the status of the plan and security needs to the State Court Administrator by June 15, 2012 Report the status of the plan and security needs to the State Court Administrator by June 15, 2012

7 SC Code of Laws SCLEA 26.1, 2, 3 SC Code of Laws Section SC Code of Laws Section Sheriff or their deputies shall attend all circuit court and enforce the courts established rules Sheriff or their deputies shall attend all circuit court and enforce the courts established rules SC Law Enforcement Accreditation Manual Chapter 26 SC Law Enforcement Accreditation Manual Chapter 26 Sections 26.1, 26.2 and 26.3 – Established Standards for the Agency responsible for security within the courtroom, courthouse itself or both. Sections 26.1, 26.2 and 26.3 – Established Standards for the Agency responsible for security within the courtroom, courthouse itself or both.

8 Self Assessment/Security Audit

9 Physical Security Checklist (Security Best Practices) Perimeter Fencing & Gates Perimeter Fencing & Gates Perimeter Lighting Perimeter Lighting Landscaping Landscaping Parking Areas Parking Areas Windows, Doors, and Other Opening Windows, Doors, and Other Opening Ceilings and Walls (true floor to ceiling) Ceilings and Walls (true floor to ceiling) Alarm Systems (intrusion detection devices) Alarm Systems (intrusion detection devices) Crawl Space and HVAC Ducting Access Control (tamper protection) Crawl Space and HVAC Ducting Access Control (tamper protection) Elevator Controls (Card Access or Key Control) Elevator Controls (Card Access or Key Control) Public Areas (restrooms, waiting rooms, etc.) Public Areas (restrooms, waiting rooms, etc.) Offices Handling Money Offices Handling Money Daily Courthouse Procedures Daily Courthouse Procedures Courthouse Procedures Courthouse Procedures

10 SAMPLE Comprehensive Checklist SEE HANDOUTS SEE HANDOUTS

11 Security & Emergency Planning

12 Court Security Plan (The Proactive Approach) (Security Best Practices) General Security Elements General Security Elements Mail Handling Mail Handling ID and Access Control ID and Access Control Parking Plan Parking Plan Interior/Exterior Lighting Plan Interior/Exterior Lighting Plan Intrusion/Panic Alarm Systems Intrusion/Panic Alarm Systems Fire Detection/Equipment Fire Detection/Equipment Emergency/Auxiliary Power Emergency/Auxiliary Power Private Security Contractors Private Security Contractors Administrative/Clerks Office Security Administrative/Clerks Office Security Jury Personnel/Jury Room Jury Personnel/Jury Room

13 Court Security Plan (The Proactive Approach) (Security Best Practices) General Security Elements (Continues) General Security Elements (Continues) Public Demonstrations Public Demonstrations Vital Records Storage Vital Records Storage Evacuation Planning Evacuation Planning After-Hours Operations After-Hours Operations Custodial Services Custodial Services Computer and Data Security Computer and Data Security Workplace Violence Workplace Violence

14 Court Security Plan (The Proactive Approach) (Security Best Practices) Operational Security Elements Operational Security Elements Security Personnel and Staffing Security Personnel and Staffing Perimeter and Entry Screening Perimeter and Entry Screening Prisoner/Inmate Transport Prisoner/Inmate Transport Holding Cells Holding Cells Interior and Public Waiting Areas Interior and Public Waiting Areas Courtroom Security Courtroom Security Jury Trial Procedures Jury Trial Procedures High Risk/High Profile Trials High Risk/High Profile Trials Judicial Protection Judicial Protection Incident Reporting and Recording Incident Reporting and Recording Security Personnel/Staff Training Security Personnel/Staff Training Courthouse Communication Courthouse Communication Bomb Threats Bomb Threats

15 Court Security Plan (The Proactive Approach) (Security Best Practices) Operational Security Elements (continues) Operational Security Elements (continues) Hostage/Escape/Lockdown/Active Shooter Procedures Hostage/Escape/Lockdown/Active Shooter Procedures Firearms Policies and Procedures Firearms Policies and Procedures Restraint of Defendants Restraint of Defendants

16 The Security Architect / Consultants Role

17 Security Committee Support Are your Security Committee equipped to develop and support every element of your Security Plan? Are your Security Committee equipped to develop and support every element of your Security Plan? Keep in Mind – This is a Collateral Duty for every member (focus and time management) Keep in Mind – This is a Collateral Duty for every member (focus and time management) Here are some elements they may require assistance with: Here are some elements they may require assistance with: Risk and Vulnerability Assessments / Security Audits Risk and Vulnerability Assessments / Security Audits Electronic Systems Design and Installation Management (Access Control, Intrusion Detection, IP Video Management/CCTV, Parking Control, Mass Notification, and Intercom Systems) Electronic Systems Design and Installation Management (Access Control, Intrusion Detection, IP Video Management/CCTV, Parking Control, Mass Notification, and Intercom Systems) Workplace Violence Awareness & Training Workplace Violence Awareness & Training Design Build & Renovation – Security Architect Support Design Build & Renovation – Security Architect Support

18 New Courthouse Design/Build & The Security Architect Is a Courthouse in your 3 to 5 year Master Plan? Is a Courthouse in your 3 to 5 year Master Plan? Who is the 1 st person you will hire in your design/build process? Who is the 1 st person you will hire in your design/build process? How will you address security during your design/build process? How will you address security during your design/build process? Require your Architect to have a Security Planner on staff? Require your Architect to have a Security Planner on staff? Hire a Security Planner directly? Hire a Security Planner directly? Tell the General Contractor to throw something in? Tell the General Contractor to throw something in? Implement your security requirements after the building has been built? Implement your security requirements after the building has been built?

19 The Architect versus General Contractor Architects Role Architects Role Direct End-User Support Direct End-User Support Facility Programing of interior and exterior spaces Facility Programing of interior and exterior spaces Design Services Design Services Specification Development Specification Development Support Bid Process and GC Selection Support Bid Process and GC Selection Construction management support Construction management support GCs Role GCs Role Material Procurement and Construction per Specs Material Procurement and Construction per Specs Construction Management Construction Management

20 Security Consultants versus Systems Integrator Consultants Role Consultants Role Direct End-User Support (Physical & Electronic Security) Direct End-User Support (Physical & Electronic Security) Facility Programing of interior and exterior spaces Facility Programing of interior and exterior spaces Security Design Security Design Specification Development Specification Development Support Bid Process and Integrator Selection Support Bid Process and Integrator Selection Installation management support Installation management support Integrators Role Integrators Role Equipment Sales, Procurement and Installation per Specs Equipment Sales, Procurement and Installation per Specs

21 When Do I Need A Consultant A consultant is typically used under the following conditions: A consultant is typically used under the following conditions: Additional Subject Mater Expertise is Required Additional Subject Mater Expertise is Required An Independent or Non-Bias Opinion is Desired An Independent or Non-Bias Opinion is Desired The effort is too labor intensive for a collateral duty The effort is too labor intensive for a collateral duty Outside your area of expertise Outside your area of expertise The Security Consultants job is to: The Security Consultants job is to: Provide his/her clients with current Best Practices in the industry Provide his/her clients with current Best Practices in the industry Support Policy and Procedure Development Support Policy and Procedure Development Support Security Audits & Vulnerability Assessments Support Security Audits & Vulnerability Assessments Provide technology analysis and recommendation via spec development Provide technology analysis and recommendation via spec development Provide project management support throughout the construction and/or installation phase Provide project management support throughout the construction and/or installation phase Perform system validation and verification during commissioning Perform system validation and verification during commissioning (MAKE THE CLIENT LOOK GOOD !!!) (MAKE THE CLIENT LOOK GOOD !!!)

22 Area of Expertise Security Consultants generally practice these areas of expertise: Security Consultants generally practice these areas of expertise: Workplace Violence Workplace Violence Emergency & Disaster Planning Emergency & Disaster Planning Security Management (i.e. Guard Force, Security Patrol, etc.) Security Management (i.e. Guard Force, Security Patrol, etc.) Physical and Electronic Security (i.e. CCTV, ACS, IDS, etc.) Physical and Electronic Security (i.e. CCTV, ACS, IDS, etc.) Cyber and Information Security (INFOSEC) Cyber and Information Security (INFOSEC) Expert Witness (to support each of the above) Expert Witness (to support each of the above)

23 Conclusions

24 Putting It All Together Transitioning from Reactive to Proactive Transitioning from Reactive to Proactive Preparedness and Prevention only occurs with planning, training and exercises Preparedness and Prevention only occurs with planning, training and exercises Security Standards and Best Practices Security Standards and Best Practices Policy & Procedure Development is always best from a Top- Down Approach Policy & Procedure Development is always best from a Top- Down Approach Policies & Procedures should change as your facility changes Policies & Procedures should change as your facility changes Security Audits Security Audits Conduct Annual Security Assessments to identify gaps Conduct Annual Security Assessments to identify gaps Emergency Planning should be re-enforced by training and annual briefings (i.e. online training, webinars, etc.) Emergency Planning should be re-enforced by training and annual briefings (i.e. online training, webinars, etc.) The Security Architect & Consultant The Security Architect & Consultant Select a consultant with expertise in areas required to cover security gaps Select a consultant with expertise in areas required to cover security gaps

25 Questions & Discussions

26 Presented By: Harold C. Gillens, PSP, CFC, CHS-III President / CEO Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC v: c:


Download ppt "Security In The Courthouse South Carolina Clerks of Court and Master of Deeds Annual Conference Presented by Harold C. Gillens, PSP, CFC, CHS-III."

Similar presentations


Ads by Google