Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Getting Personal on Campus

By Bill Zalud
October 20, 2003


With the hundreds of thousands of students returning to the nation's colleges and universities this fall, there's a corresponding ramp-up in personal security.

Mandated by federal legislation to account for and report on certain crimes on campus, higher education institutions often have shifted their security officers to a sworn police force as well as now employ more security technology on campus.

In one unique application, Indianapolis, Ind.-based Butler University is testing a wireless personal alarm system in which students under duress use a pendant to alert campus security through more traditional emergency telephones.

Called the Circle-of-Safety Wireless Personal Alarm System, implementation of the system makes the university the first in the country to offer such advanced personal protection in a proactive application.

Wireless Transmitter

The system features a wireless pendant transmitter, which resembles a car remote and fits on a key chain. It can activate the 18 white cylindrical emergency telephone poles located throughout the 290-acre Butler campus. Several years ago, Butler installed Code Blue, Holland, Mich., emergency telephone poles.

Pendants are available to students, faculty and staff for a nominal fee, plus an annual administrative fee that will support the program.

"We are excited about the Circle-of-Safety," Dave Selby, chief of police, says. "Creating a safe campus community is an obligation we have to our students, faculty and staff."

Selby was promoted to chief of police in 1997. Almost from the beginning, he looked at strategies for better security. "One goal was to replace an old intercom system for emergencies on campus. Sometimes these old call boxes are affected by weather."

That's when the university called in Code Blue. "We opened the equipment up for more that emergency use. Each has two phone lines – a telephone and a panic button," Selby says.

Active Control Technology Inc. of Mississauga, Ontario, Canada developed the pendants, in collaboration with Code Blue. They have a personal identification code that allows the Butler University Police Department (BUPD) to identify the name of the user who activates the pendant and his/her location within a 200-foot range. As soon as the pendant is activated, the user's personal and medical information, as well as the location of the activated pole, appears on BUPD's computer system prompting an immediate response.

"Those who are in need of help no longer will have to physically go to an emergency telephone pole to activate the response system," Selby observes. Security also will increase significantly for disabled individuals, as well as those with medical conditions, who may not have the capability to reach a phone in the event of an emergency.

More Technology Coming

"This is just the first phase to continuing to provide a safe campus environment," Selby adds. The second phase calls for the university to add more Code Blue emergency telephone poles on campus, as well as to install additional diagnostic software that will enable BUPD to determine the exact X-Y coordinates of a user when the pendant is activated.

Founded in 1855, Butler University serves more than 4,000 undergraduate and graduate students.

SIDEBAR: Campus Crime Disclosure

The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act is federal law that requires colleges and universities to disclose certain timely and annual information about campus crime and security policies. The Clery Act, enacted by Congress and signed into law by President George Bush as the Crime Awareness and Campus Security Act of 1990, was supported by Howard and Connie Clery after their daughter Jeanne was murdered at Pennsylvania's Lehigh University in 1986.

Schools have to publish an annual report every year. The report must contain three years worth of campus crime statistics and certain security policy statements including sexual assault policies, which assure basic victims' rights, the law enforcement authority of campus police and where students should go to report crimes. The report is available to current students and employees while prospective students and employees are notified of its existence and afforded an opportunity to request a copy.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Biometrics – Getting Personal and Liking It

    See More
  • Getting Detailed on Privacy Protection

    See More
  • Getting the Low-down on High-end Digital Video

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing