Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

BEST PRACTICES

January 16, 2004
The FedEx Institute of Technology at the University of Memphis includes wireless communications that also includes video security capability.


Los Angeles County Education Office:

Standards, Controls

Boost Program The Los Angeles County Office of Education in Downey, Calif., is tough on security. Overseeing nearly 350 sites within the county and over 6,000 employees, the security operation maximizes and organizes itself to meet specific needs. Serving for five years as the education office’s first security services manager, Jack Eckles works in its division of business operations. He continues to forge ahead with the aim of seamless integration of standardized systems of alarms, access control and video surveillance. Technology sources include PCSC, Torrance, Calif., which provides for the integration of third-party vendor equipment and services to connect the security systems.

One of Eckles’ first goals was to move the video surveillance system over to digital. The video equipment itself consists predominantly of tape recorders from Surrey, British Columbia-based Gyyr/Silent Witness. The majority of the cameras are from Sony, Park Ridge, N.J. Eckles says he is in the midst of switching over to digital recording and is leaning toward Chantilly, Va.-based Dedicated Micros.

“When I got here, my focus was to get away from relying on site administrators to have to change tapes daily,” Eckles says. “I wanted to get away from the human equation and hook up digital recording systems with Internet access. We also have over 125 cameras between three administrative buildings. The main security office is pretty crowded when you have 200 videotapes.”

As a policy, the security operation keeps tapes for 30 days, which means going through 30 tapes a month. “As we expand, it becomes space-prohibitive,” Eckles says, adding that digital recorders translate to “a tremendous space saver for us.”

The entire project could become a three-year undertaking. According to Eckles, the security department plans to grow and learn with its information technology department to fully maximize digital’s potential.

Changing of the Guard

Eckles’ security operation emphasizes the importance and advantages of standardization and integration of alarms, video security and electronic access controls with central station emergency response. But there also is a close relationship of the organization with its contract officer force, with particular emphasis on retention of quality officers and connection to the emergency response program. Eckles keeps close control over the contracted guard personnel, and every five years puts the guarding contract out for bid.

“Close attention must be made to contracted personnel,” he says. “Our aim is to make them feel a part of the organization. When we switch out new companies on new contracts, we have the option of taking the best with us and rolling them over into the new company. In our last go-around, we were able to move over 85 percent of the staff.”

To make contracted security officers feel as though they are part of the county’s security staff, Eckles says he talks “to” the officers, not “down” to them. By not being arbitrary or capricious in his relationships with the security guarding personnel, he says he is more of a mentor. If a guard makes a mistake, Eckles says he responds in an instructional way.

“You have to back your contract employees,” he says. “You have to let them know that you back them to have their trust.”

Milwaukee Public Schools: Monitoring, Cooperation Reduce Threats

The bottom line for Peter Pochowski at the Milwaukee public school system is the measurable reduction in threats coming from in-house, fewer drug suspensions and smoother coordination with police.

As director of safety and security for the Milwaukee school district, Pochowski says the bottom-line achievements go a long way to accomplishing his team’s mission of “providing peace of mind to all our stakeholders.”

The operation has diversified and deepened security through use of a digital telephone system that enables security personnel to track threatening calls made within the school district’s facilities. There is greater and closer cooperation with local law enforcement agencies than in many other municipalities. And the system is in the second year of using a K9 drug unit to sweep secondary schools.

“We have a community here, an urban environment,” Pochowski says. “The idea is to create a mindset within the community so that students and staff are free to conduct their business,” which is learning. “In order to have a vibrant city, your school system is critical,” he says.

Pochowski uses electronic security equipment as a “force enhancer.” While one person can see a lot, one person monitoring a number of cameras can see even more.

“We see an advantage in using electronic security devices,” he says. “In the few schools where we do not have cameras, we have electronic monitors.”

Digital Phone System Added

Milwaukee’s public schools now have a digital telephone system, which plays an essential role in crime prevention.

“Any phone calls made in the system, we can track,” Pochowski says.

Whatever the technology or security program, Pochowski notes that the security operation focuses on the district’s goal to have the best schools with the best teachers, with a safe and secure educational environment as a critical part of that commitment.

“We have zero tolerance for situations that endanger that safe and secure environment,” says Pochowski, a former captain with the Milwaukee Police Department, who continues to value a deep commitment to community. “Our safety and security operation is customer oriented,” he stresses. “We are here to help get our kids through school successfully.”

Using a mixture of programs, policies and electronics, Milwaukee’s schools have lowered the number of incidents. A security console at the entrance to high schools alerts security personnel to door breaches. Digital cameras and recorders provide a high level of security while also identifying people involved in door-access events. Cameras provide views from remote locations, assisting first responders and police. The digital telephone system has cut down nuisance threats coming from inside school buildings, and the K9 unit has lowered drug-possession suspensions. The program has achieved success thanks to use of technology as well as a fine focus.

University of Maryland: Integrated Operations Center Pays Off

Gathering and sharing information has paid off for the Department of Public Safety at the University of Maryland in College Park, Md. As public safety manager, Craig Chucker worked with his team to bring security integration to the school.

“When I first arrived at the university, we were monitoring just a few cameras, with alarms in another part of the operation, and electronic access control in yet another,” Chucker says, who quickly determined that an integrated approach was needed. “What I did was merge all three together. The security operations center now monitors alarms, access and cameras. It’s an ‘everything’ approach that has paid off.”

Chucker also has addressed the need to protect computers and similar devices on campus, using electronic tags on computers and hardwiring them into alarms so the devices can be monitored.

Himself a former University of Maryland student, Chucker brought that perspective to his current job as well as retail security experience from Neiman Marcus and a business operations background from running his own security firm, which he sold in 1996.

At the university, there is increased attention to protecting faculty and staff as well as minimizing theft of hardware and intellectual property, Chucker says. “We employ biometrics, including finger and hand geometry,” he says.

On the student side, the public safety manager has an aggressive program of security cameras.

“We do our own installation of cameras as well as maintenance of the cameras,” Chucker adds.

To aid in protecting students, staff and visitors as they walk on campus, the university uses an emergency telephone system from Talk-A-Phone in Chicago.

More of the Best

The University of Memphis has upgraded its communications network to use the latest in wireless technology. The advance, from Avaya Inc. of Basking Ridge, N.J., allows students and faculty untethered freedom to move about the 1,160-acre campus while using laptops, personal digital assistants and other devices to connect to the Internet and the university’s intranet. “Wireless is a key technology advantage for the university because it overcomes the dual barriers of time and distance,” says Doug Hurley, vice president for information technology and the university’s CIO. “Wireless enables just-in-time learning and encourages innovative interactions in ways never before possible.” In addition to providing mobility for students, the Avaya wireless LAN links security video cameras across campus to provide surveillance of public areas. This feature allows security officials to monitor activity no matter where they are on campus, even from inside a patrol car. The university also will be home to the FedEx Institute of Technology, a joint collaboration among the university, FedEx and other leading corporations. The Avaya Wireless LAN solution will be part of the institute, providing communications and security support.

The Indianapolis Public Schools, Indiana’s largest school district, has partnered with Honeywell Building Solutions, Minneapolis, to improve school security through the district-wide installation of various technologies including an asset locator to provide real-time tracking and location of tagged assets and personnel; upgraded access using NexWatch; and digital video monitoring and surveillance across the network. The district has 90 buildings and 330 buses that transport students each school day. “With Honeywell’s broad portfolio of offerings, we are able to leverage our existing equipment and create opportunities for savings, efficiency and improved security,” says Richard Joest, technology and security director for Indianapolis Public Schools.

The Diocese of Orlando (Fla.) is one of many educational organizations throughout the country that has participated in school safety workshops aimed at reducing risk, which are sponsored by Alexandria, Va.-based Sonitrol, part of the Tyco Fire & Security family. Sonitrol conducted two different workshops for the diocese: one for principals and assistant principals of the organization’s 35 Catholic schools, and a second for the 900 diocesan school employees. The outcome: a safe-school committee, which drafted an emergency-management plan with a quick-reference guide for each of the classrooms within the school district. “The key to making schools safe is to reduce risk on a daily basis,” says Wolfgang Halbig, executive director at the National Institute for School and Workplace Safety.

The Lancaster (Calif.) School District uses fixed and mobile patrols to protect the seventeen schools in the district, according to Haywood Stribling.

The University of Pennsylvania in Philadelphia and the University of Bridgeport in Connecticut were the 2003 recipients of the Jeanne Clery Campus Safety Award from Security On Campus Inc., King of Prussia, Pa. The award is based on the effective use of cutting-edge technologies, which are now available to greatly improve campus safety. Such technologies – sophisticated surveillance systems in the case of the University of Pennsylvania and a monitored personal alarm device network at the University of Bridgeport – are becoming more affordable, according to Security On Campus. The Pennsylvania institution achieved decreases in overall crime of more than 30 percent. “We wanted to honor the University of Pennsylvania for its innovative technological programs as well as its campus and community patrols,” says Howard Clery III of Security On Campus. At the University of Bridgeport, a personal-alarm device system was installed seven years ago as a solution to the problem of criminals preying upon students on the urban campus. April Vournelis, director of the Bridgeport school’s campus security, provides every student and employee with a personal alarm device that, when activated, calls the campus security department indicating the person’s exact location.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity

    Top Five Best Cybersecurity Best Practices

    See More
  • Smart Card Alliance Identity Council White Paper Outlines Best Practices for Emergency Response Official Identification

    See More
  • New Research Identifies Best Practices for Contactless Payments

    See More

Related Products

See More Products
  • Whitepaper-Social-Media-3.gif

    Optimizing Social Media from a B2B Perspective

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • May 22, 2012

    Teleconference: Business Continuity Best Practices Group

    Join this collection of security practitioners and become part of the next generation of business continuity and crisis management program development.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!