Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Analyzing Incidents

November 11, 2003

Ease of customization is one of the essential elements that attracted the British Broadcasting Corporation (BBC) to a computer-based security incident-reporting program. Incident reporting software can track incidents, manage investigations, analyze information, create reports, add graphs, monitor losses and liabilities, control insurance costs as well as justify a security department budget.

The BBC employs 26,000 staff around the world. It interacts with just as many contractors working in its 585 United Kingdom-based buildings and over 400 international bureaus and offices.

The flagship facility is the Television Centre in Wood Lane, London. It is home to over 7,000 staff, eight television studios and the BBC’s international news headquarters. At the other end of the scale, there are unmanned broadcast studios in shared or multi-occupied sites elsewhere in the world.

Other London-based buildings include Broadcasting House in Portland Place (the home of BBC radio since 1922 when broadcasting by radio first began) and Bush House in the Strand (the BBC’s World Service headquarters).

Like other organizations, the BBC takes security and safety of its staff seriously. Recent experiences such as the murder of news presenter Jill Dando outside her home and the terrorist bombing of the Television Centre highlight the seriousness of threats. Add to that the routine types of crime like theft, fraud and burglary that most businesses suffer, and you begin to see that the BBC needs a number of tools for addressing those risks.
 

Staff Support

For generations, it has employed a number of internal investigators and a strong health and safety support team. Additionally, there are a number of security risk advisors who carry out risk assessments on BBC buildings, staff and operations.

In the past, BBC investigators had maintained meticulous logs of their cases and paper files. They eventually moved on to a computerized recording system some years ago. That particular system was DOS-based and homemade. It was a leap into the future for the investigators of the day. The system successfully recorded much of the work that they were doing. But the system had to be supported by a paper file system.

Recently, it was recognized that the system was getting old, cumbersome to use and hopeless to search. So the BBC decided to look for an alternative.

Another in-house system was considered, and software suppliers were sought that might be able to provide a product that would meet recording, reporting and searching needs. In-house provision soon proved too costly and too difficult.

The BBC found the PPM 2000 site (PPM 2000, Edmonton, Alberta, Canada) on the Internet and discovered its Incident Reporting & Investigation Management software or IRIMS. According to BBC’s Eddie Halling, “It seemed to offer all that we were looking for.”

Says Halling, IRIMS was easy to customize to BBC needs. “All our building details were easily installed on the system. The investigators were trained in its use, and an administrator was appointed from within the team and further trained in IRIMS administrative work.” Uniquely, IRIMS is also used in the BBC by information technology (IT) security for reporting and recording IT security issues.

The experience that staff reported in the use of the system was that it was simplicity itself. Adds Halling, “It was less complex than our old system and much more user friendly. Furthermore, the conversion of our old data by PPM into IRIMS format enabled us to access years of information in the new format.”

He tells SECURITY magazine that once an incident is reported to investigators, it is recorded. As well as recording all relevant statistical and other information, IRIMS is used for crime pattern analysis. “From that analysis, we are able to deploy investigators and other resources to active crime locations in a proactive manner.”

The security risk advisors use the same information to evaluate risks in the BBC facilities.

In addition, the system readily identifies repeat victims. This is particularly useful in the media industry where so many of staff and talent are the victims of unwanted and unsolicited activity from stalkers. Knowledge of repeat victimization assists investigators in their delivery of a professional and meaningful investigation and a subsequent solution to this and any other type of crime.

“They often rely on the records contained within IRIMS to support insurance claims for lost or stolen goods,” says Halling.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • SEC1219-Edu1-Feat-slide1_900px

    Analyzing the California Attorney General’s comments on drafting privacy policies

    See More
  • SEC0219-data-Feat-slide1_900px

    CCPA update: Analyzing the changes to the final CCPA Regulations

    See More
  • SEC1219-Edu1-Feat-slide1_900px

    CCPA Update: Analyzing the AG's Proposed Regulations

    See More

Events

View AllSubmit An Event
  • February 26, 2026

    Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

    ON DEMAND: Workplace violence remains one of the most complex challenges facing healthcare organizations today. Explore the real drivers of violence in healthcare and how proactive communication, de-escalation, access control, and documentation can reduce risk.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing