This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Catching Up With the Clery Act
Trends Column

Catching Up With the Clery Act

Mark McCourt
June 1, 2012
Mark McCourt
KEYWORDS campus crime / campus security / Clery Act
Reprints
No Comments
Security on Campus logo

Alison Kiss is the Executive Director at Security on Campus, the organization co-founded in 1987 by Connie and Howard Clery, following the rape and murder of their daughter Jeanne at Lehigh University. The result of their effort is The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, which requires institutions of higher education to release campus crime statistics and security policies to their current and prospective students and employees.

Now in its 25th year, Security on Campus’ new leader has some innovative plans that will not only help universities, but will benefit leaders in other sectors.

This is perhaps the single, most transparency creating law in security’s history. It has required hiring, funding and reorganization at the university level in an unparalleled manner. Neither 911, Katrina nor Sarbanes Oxley have had as much of an impact on individual organizations as Clery has had on its market. At the core of the law is money: All institutions that receive federal Department of Education funding, must report under Clery.

Kiss worked at Security on Campus from 2004 through 2009 where she was instrumental in the development and implementation of curricula for the Safe On Campus Peer Education Program and for the Victim Support Services Module of the Clery Act Training Program. She left to earn her Masters of Science in Criminal Justice from Saint Joseph’s University. She has now returned to the organization as Executive Director. As she begins her second year, we had the opportunity to discuss this important organization. 

 

Security: What will we see in the near future from Security on Campus?

Kiss: We will be bringing our name, Security on Campus together with the better known Clery name to improve recognition. To do this, we will be rebranding as The Clery Foundation’s Security on Campus. We will be launching a new website and training programs, as well.

 

Security: Tell us about your new website.

Kiss: The most important addition is online technical assistance for colleges and universities seeking to understand the Clery Act and achieve compliance. This will be a powerful new tool for the market. There are different training and consulting programs that interpret the law differently and give different information to schools regarding compliance. The online tool will help universities and colleges get clarity.

 

Security: And what new training programs are you adding?

Kiss: Our new programs are a reflection of what the universities are asking for: A system-wide program. To explain, we used to see one compliance manager attend our program representing a university system with multiple campuses. And that compliance person would go back and try to implement Clery across these campuses. The results were not always positive. Now we are getting requests for programs focusing on compliance and continuity. So representatives from each campus are being trained and charged with implementing a successful on campus program. Our new system-wide programs meet this need.

 

Security: Both your online tool and system-wide training program are designed to help organizations understand and comply with the Act. Is this law challenging to understand?

Kiss: It can be. There is a challenge for organizations to balance adhering to the “letter of the law” versus “the spirit of the law.” For example, what counts in terms of Clery geography is an issue. If there is a bridge on campus leading to a park, what falls under Clery? Where do you or do you not report an incident as “on campus?”

So, we try to smooth out the multiple interpretations of the law. One of our longer term goals is to simplify the Act by working with Congress.

 

Security: What are your interests outside of work?

Kiss: I am an avid distance runner and a volunteer on the Board of Directors for the Kristin Mitchell Foundation, which assists with communications for the Preeclampsia Foundation.   

Subscribe to Security Magazine

Recent Articles by Mark McCourt

A New Year's Prediction: The Internet of Things Changes Everything

As Risks Expand, So Does Security's Responsibility

How the Security Evolution Turns to Prediction

John Dailey: Life Happens Here

Gary Gagnon: Unique-ness

Mark McCourt is the publisher of Security magazine.

Related Articles

Catching Up with Bonnie Michelman

Post ASIS – Catching Up with New Faces

Related Products

The Handbook for School Safety and Security

Risk Analysis and the Security Survey, 4th Edition

Physical Security and Safety: A Field Guide for the Practitioner

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing