Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Analyzing Incidents

November 11, 2003

Ease of customization is one of the essential elements that attracted the British Broadcasting Corporation (BBC) to a computer-based security incident-reporting program. Incident reporting software can track incidents, manage investigations, analyze information, create reports, add graphs, monitor losses and liabilities, control insurance costs as well as justify a security department budget.

The BBC employs 26,000 staff around the world. It interacts with just as many contractors working in its 585 United Kingdom-based buildings and over 400 international bureaus and offices.

The flagship facility is the Television Centre in Wood Lane, London. It is home to over 7,000 staff, eight television studios and the BBC’s international news headquarters. At the other end of the scale, there are unmanned broadcast studios in shared or multi-occupied sites elsewhere in the world.

Other London-based buildings include Broadcasting House in Portland Place (the home of BBC radio since 1922 when broadcasting by radio first began) and Bush House in the Strand (the BBC’s World Service headquarters).

Like other organizations, the BBC takes security and safety of its staff seriously. Recent experiences such as the murder of news presenter Jill Dando outside her home and the terrorist bombing of the Television Centre highlight the seriousness of threats. Add to that the routine types of crime like theft, fraud and burglary that most businesses suffer, and you begin to see that the BBC needs a number of tools for addressing those risks.
 

Staff Support

For generations, it has employed a number of internal investigators and a strong health and safety support team. Additionally, there are a number of security risk advisors who carry out risk assessments on BBC buildings, staff and operations.

In the past, BBC investigators had maintained meticulous logs of their cases and paper files. They eventually moved on to a computerized recording system some years ago. That particular system was DOS-based and homemade. It was a leap into the future for the investigators of the day. The system successfully recorded much of the work that they were doing. But the system had to be supported by a paper file system.

Recently, it was recognized that the system was getting old, cumbersome to use and hopeless to search. So the BBC decided to look for an alternative.

Another in-house system was considered, and software suppliers were sought that might be able to provide a product that would meet recording, reporting and searching needs. In-house provision soon proved too costly and too difficult.

The BBC found the PPM 2000 site (PPM 2000, Edmonton, Alberta, Canada) on the Internet and discovered its Incident Reporting & Investigation Management software or IRIMS. According to BBC’s Eddie Halling, “It seemed to offer all that we were looking for.”

Says Halling, IRIMS was easy to customize to BBC needs. “All our building details were easily installed on the system. The investigators were trained in its use, and an administrator was appointed from within the team and further trained in IRIMS administrative work.” Uniquely, IRIMS is also used in the BBC by information technology (IT) security for reporting and recording IT security issues.

The experience that staff reported in the use of the system was that it was simplicity itself. Adds Halling, “It was less complex than our old system and much more user friendly. Furthermore, the conversion of our old data by PPM into IRIMS format enabled us to access years of information in the new format.”

He tells SECURITY magazine that once an incident is reported to investigators, it is recorded. As well as recording all relevant statistical and other information, IRIMS is used for crime pattern analysis. “From that analysis, we are able to deploy investigators and other resources to active crime locations in a proactive manner.”

The security risk advisors use the same information to evaluate risks in the BBC facilities.

In addition, the system readily identifies repeat victims. This is particularly useful in the media industry where so many of staff and talent are the victims of unwanted and unsolicited activity from stalkers. Knowledge of repeat victimization assists investigators in their delivery of a professional and meaningful investigation and a subsequent solution to this and any other type of crime.

“They often rely on the records contained within IRIMS to support insurance claims for lost or stolen goods,” says Halling.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1219-Edu1-Feat-slide1_900px

    Analyzing the California Attorney General’s comments on drafting privacy policies

    See More
  • SEC0219-data-Feat-slide1_900px

    CCPA update: Analyzing the changes to the final CCPA Regulations

    See More
  • SEC1219-Edu1-Feat-slide1_900px

    CCPA Update: Analyzing the AG's Proposed Regulations

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing