Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Getting the Word Out

By Bill Zalud
April 1, 2009
Speakers were part of the Inauguration security in case messages needed to be broadcast to attendees. Photo courtesy of Federal Signal


Whether it’s a crime incident or a tornado, an electrical crash or even a special sale on concert tickets, getting the word out to a community of employees, students or city residents is now easier thanks to mass notification systems.
     
They incorporate a variety of response mechanisms to allow enterprises and institutions to improve communications often in the event of an emergency. But the systems can improve the business processes of major corporations and even create an income stream for colleges and cities.
     
The best definition of mass notification is a means to notify occupants of a building or area in a real-time setting. A primary command center broadcasts live or pre-recorded emergency voice and data messages and/or instructions. The overall aim is to get accurate and useful information out to people who need it. The trick is to use enough types of means of communication to get the word out to most everyone. There are systems that work with existing fire alarm systems and emergency telephone systems. Others play off of cellular telephones, instant messaging and smartphones as well as audio broadcast, strobes, computer displays and even LED-enabled billboards.


Notices can be delivered through networked desktop and laptop computers with ways to note receipt and action taken.

TOO DEPENDENT ON MASS MEDIA

According to research by CDW-Government, there still is a disconnect between companies, schools and government agencies and their ways of getting the word out. Many still depend on broadcast media. But media consumption habits are changing: Americans watch less TV, are more mobile and, especially within younger demographics, are increasingly reliant on cell phones and text messaging. Most governments and companies have not kept pace with these developments, which can keep people safe in emergencies. City, state and local governments primarily rely on television and radio to communicate emergency information to the public, according to the CDW-Government study. Both require citizens to have access to electricity and actively “tune in.” In an emergency, people need to be notified quickly so they know either to take shelter at their current location or move to a safe location. Time is usually of the essence.
     
So enterprises are turning to newer ways.
     
UCLA created its campus-wide emergency mass notification system, known as “BruinAlert,” based on AtHoc software. With this deployment of the network-centric emergency notification solution, UCLA became one of the first major American universities to deploy an effective mass notification system that fully unified all campus communications resources. The implementation of its network-centric emergency notification system came about as the result of a comprehensive needs gathering and system evaluation process.
     
More than 60,000 students and staff engage in a variety of activities on the UCLA campus. To protect them, UCLA’s emergency notification capabilities had evolved to incorporate new technologies. As a result, the university developed a comprehensive set of separate alerting systems, including bulk e-mail, AM radio, a cable television station and a Web site.  However, no single method of alerting could guarantee contact with everyone during an emergency. That was the reason behind UCLA’s desire to use multiple forms of alerting that could be triggered through a single system.
     
Such systems also need testing.
     
Just last month, the University of Houston Department of Public Safety tested its mass notification voice and siren system. The siren sounded for 30 seconds, followed by a brief voice message. The university plans to use the system in the event of emergencies such as severe weather conditions, active shooter or other terrorism incidents and major hazardous material incidents.


BEYOND THE PHONE TREES

In another example, although emergency communications has always been a primary concern of Longwood University, the university was unable to communicate to the campus community quickly and efficiently in an emergency. 
     
Like many colleges, Longwood relied on contact phone trees for internal communications and media outlets for external communications. There were no means to notify students who were outdoors or off-campus within seconds of a disaster or if there was a power outage. “The events at Virginia Tech and other schools across the country have demonstrated the necessity to create redundant effective systems that provide information among many pathways,” said Longwood’s Dan Dillon.
     
So he brought in Cooper Notification’s mass notification system, which includes outdoor warning systems, emergency text messaging and e-mail alerts, enables officials to alert the campus community in real-time during times of extreme circumstances such as a tornado or police emergency, and offers the best protection for the entire campus. There are six high power speaker arrays at highly populated on- and off-campus locations for exterior voice alerting. In an emergency, they broadcast a siren alert, followed by a live or recorded voice message tailored to the situation. The intrusive system has the capability of alerting the entire campus or individual areas depending on the scope of the emergency.
     
On a tight economy, organizations also see ways to generate revenue from mass notification. Especially at educational institutions, some have established notification systems that allow opt-in for messages that are not necessarily for emergencies. The information may center on campus events, sales pitches and paid advertising.
     
More recently, corporations, government agencies and the military have sought for notification tools to send out messages over networked desktop and laptop computers.
     
One example, also from Cooper Notification, is technology which turns computer desktops into emergency notification devices. When critical information must be communicated, it allows authorized administrators to send audio and visual pop-up notifications within seconds to all recipients or targeted groups who are logged onto the network. It enables organizations to customize their desktop pop-up screens and provide links to access maps, evacuation routes and additional emergency information as well as two-way communications for delivery confirmation and user response,
     
Compounding matters is the fact that no industry standard governing mass notification systems exists. The only exception in this standard-free environment is the U.S. Department of Defense (DoD) guidelines written to address mass notification on military bases.


PART OF LIFE SAFETY SYSTEMS

A combination fire alarm/mass notification system is declared to be “the simplest and most economical approach” for U.S. military bases and other DoD properties. The 2010 edition of NFPA 72: National Fire Alarm Code is expected to replicate the specifications for private sector applications.
     
Most commercial buildings already encompass a fire alarm system that is required by code to be tested and maintained on a regular basis. Today’s high-tech fire alarms are supervised systems, constructed to be more “survivable,” which enables them to continue functioning properly even when one or more parts are damaged. Stringent codes applied to these systems also dictate a high-level of intelligibility to ensure live voice and pre-recorded messages can be clearly understood. The same intelligibility conditions apply to the phone communications provided between components of a combo fire alarm/MNS for security and first responders to use as a means for communicating during an emergency. One example, Gamewell-FCI has a line for both new construction and renovation applications.
 
Another approach that has a leg up is through emergency telephone systems, which traditionally have been installed in colleges, hospitals, airport parking lots and garages. From sources such as Talk-A-Phone and Code Blue, existing equipment can be transformed to emergency broadcasting systems for maximum audio clarity and range.
     
Whether at a college or university, a corporate campus, military base, utility plant, airport, shipping complex or any other multi-building setting, IP or network-capable mass notification systems can provide solutions in tying together indoor and outdoor areas. In most cases, IP infrastructure already exists. Wide-area paging, for instance, can link together buildings and outdoor parking lots and play grounds. That can be accomplished wirelessly or by installing additional cable runs to outdoor areas.


INTEGRATED EMERGENCY PHONES

For instance, Talk-A-Phone’s wide-area emergency broadcast system has IP and analog options that can also integrate with other devices on the network, including wall-mounts, indoor and outdoor paging units, blue-light strobes and security video cameras. 
     
The advantage of an IP-based mass notification system is that it can integrate text, e-mail, instant messaging, telephone, PDA, fax machines, TYY for the hearing impaired and satellite-based communications.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ip feat

    Measuring the Next Step in IP-Based Access Control

    See More
  • Multi-tasking – It’s in the Cards

    See More
  • Rx for Secure Healthcare Access

    Finding the Right Prescription for Secure Healthcare Access Control

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!