Travel Reference
In-Depth Information
and other crimes of violence are far more prevalent and may be virtually
eliminated with the appropriate attention paid to limiting access. In addi-
tion, crimes of violence perpetrated by disgruntled employees are becom-
ing quite common and may also be prevented if the security staff is doing
its job.
The issue of access limitation is one of identification confirmation
combined with the ability to physically prevent unauthorized individuals
from getting it. Identification is generally an easy task. Corporate per-
sonnel may simply be issued identification cards or badges that must be
displayed to the security staff upon entry. Secure electronic entry is also
becoming easier to accomplish through the application of technology.
Equipment is available that can recognize faces, hand size, voice, preset
codes, and even the patterns in a person's retina. Confirmation is also
an easy task. Guests and visitors to the building should be pre-screened
through security. An employee expecting the visitor need only make noti-
fication to the security desk and provide the identity and anticipated
arrival time of the individual. Many companies require that a simple vis-
itor form be filled out and provided to security prior to the arrival of any
guests. Exhibit 12.9 is an example of such a notification form.
This simple form will allow expected visitors to be admitted quickly
and professionally, without unnecessary delay. Measures like this will also be
noted by anyone with criminal intentions who is conducting a pre-operational
surveillance. Do not underestimate the deterrence value of protocols such
as these.
Search WWH ::




Custom Search