Practical, step-by-step guides for the busy FM
May 2002
A security survey is a thorough on-site examination and analysis of a facility to determine what assets are present and their value; to evaluate the existing security program; to identify differences or excesses; to determine the protection needed; and to support recommendations to improve overall security.
When conducting a security survey, a team approach will yield a more comprehensive assessment of vulnerability to specific risks. Occupant participation in the security survey is essential, especially when ascertaining the presence of assets.
The security survey, in conjunction with a thorough risk analysis, can assist a business enterprise in developing policies and procedures to do the following:
- Protect against external and internal theft, burglary, robbery, arson, violent crimes, malicious damage, and other threats.
- Provide security systems, which may incorporate both access control and internal burglar alarm components.
- Establish lock-and-key control procedures.
- Provide control over the movement and identification of employees, customers, and visitors on company property.
- Identify the resources available and necessary for the establishment of an effective security program.
The security survey must be tailored to the type of business operation that takes place within the facility. Before making the survey, the team should prepare worksheets or checklists to gather specific information on-site. A facility manager can use the following checklist of questions in gathering information during the security survey phase of implementing a comprehensive security program.
Security Survey Checklist
Perimeter Security
- Where are the main entrances to the building, and how are they currently protected? For example, by guards, by ordinary mechanical locks, with a keypad, or with other technology?
- What are the requirements for screening or controlling access at the perimeter of the building? Perimeter screening and control are vitally important because they are often the first and perhaps only line of defense before unauthorized persons attempt to access occupant areas. Perimeter screening, even if it is passive, gives occupants some assurance that access to their space, business operations, and information is controlled. If the perimeter screening and control are manual, are people required to sign in or out in a logbook, or to identify themselves with a company badge?
- Does the crime rate in the community warrant screening access at all entrance points?
- Do building occupants want all access screened at all times, or just after certain hours on certain days? Bear in mind that, as a representative of the owner(s), you may have some obligation to demonstrate to non-occupants that the facility is private; therefore, access should probably be controlled in some fashion.
- Where are the secondary building access points, and how are they protected? For purposes of this chapter, the secondary building access points are entry points from the exterior to the interior of the building that are not ordinarily used except in an emergency or special situation.
- Are the secondary entrances and exits secure from the outside but capable of being opened from the inside in an emergency?
- Do the secondary entrances have alarms? If so, where are the alarms annunciated? Are these exits also monitored by video cameras tied to time-lapse recorder devices to help pinpoint the cause of the alarm?
- Are all deliveries and shipments from the building logged and/or controlled in some way? Is there a secure holding area in which access to materials shipped to the building is controlled or monitored before these materials are shipped to tenants?
Office Security
- Where are offices located? What assets are contained therein?
- Are the offices locked? At what time are they locked? Are the doors and windows of the offices checked by security personnel after business hours?
- Are the company records stored within the office? Are file cabinets locked?
- Are any central station or local alarms installed to protect the office?
Cafeteria
- What security is provided for the proceeds from sales?
- How are foodstuffs protected?
- Where are vending machines located? Have the machines been vandalized during the past 12 months?
Parking Areas
- If there are underground parking garages, is admittance currently restricted by physical means? If a multistory parking garage exists, how is access screened?
- If there are parking lots, is entrance to the lots screened by physical means? Does the facility design feature a visitor parking area that is segregated from the tenant parking area?
- Are vehicles entering the facility parking lots screened? Do the crime rate in the community and vehicle screening measures conducted at nearby occupancies warrant vehicle screening at the driveway entrance to the building? Does the screening occur at the driveway entrance to the building? Does the screening occur only during specific hours and days, or at all times?
This installment of FM Check List is adapted from BOMI Institute’s newly updated Technologies for Facilities Management,(www.bomi-edu.org/13041.html) a course in the Institute’s Facilities Management Administrator (FMA) designation program.