Latest In

Architecture & Design

School And Safety - Technology Delivers Security To Campus

High-tech hardware, focused design, and dedicated security personnel help keep risks in check. As technology delivers security to campus, it reduces safety concerns.

Author:George EvansSep 01, 2024
16 Shares
16K Views
When technology delivers security to campus, what can be expected?
Campus security today ranks higher on college administrators’ lists of priorities than it did just a few years ago.
Most experts cite the Virginia Tech shootings in 2007 as a pivotal influence. Thirty-two people were killed and 17 wounded at Virginia Polytechnic Institute and State University in Blacksburg, Virginia.
Security specialists stress, however, no single factor is responsible for the increased presence of devices, such as cameras and card readers; rather, campus security evolved along with:
  • technology
  • government mandates
  • liability concerns

Experts’ Points Of View

John Wekenborg, field systems specialist for Bosch Security Systems, Inc. (Fairport, New York State), said:
Recent high-profile incidents increased student and staff awareness. Schools are requesting more information on video surveillance, access control, panic alarms, and mass-notification systems.- John Wekenborg
He added:
Students and staff are attending school-sponsored seminars on campus security and surrounding-area awareness. Campus security officers, law enforcement, and first responders are increasing their training.- John Wekenborg
Wekenborg further commented:
I believe that the schools understand that there is a justified need to adapt new technology and techniques. The real issue is being able to fund these projects.- John Wekenborg
He concluded:
The most common response I hear is that they are asking for grant money, or if there is any extra money in a construction budget, they will use it on security.- John Wekenborg
Matt Bretoi, vice president of the North America field sales security and surveillance at FLIR Commercial Systems, Inc. (Goleta, California), agreed, saying:
Campus security has changed.- Matt Bretoi
He elaborated:
For years, the campus law enforcement or the campus safety department was looked at as the primary, if not the only, source of security on campus.- Matt Bretoi
Bretoi added:
When electronic security, such as surveillance and access control, did start coming into play, it was handled building by building. The campus bookstore may have had a CCTV system, but not the dorms or classroom buildings.- Matt Bretoi
John Grabowski, national sales and marketing manager at JVC Security Division (Wayne, New Jersey), said:
Security systems, many centered on video surveillance, are proliferating in the education market.- John Grabowski
The period since 9/11 has seen the “growth of the Internet and networked systems, which has brought video surveillance and other security solutions into a new era of capabilities,” Grabowski added.
He concluded:
The sheer variety and quantity of solutions on the market can be daunting.- John Grabowski
Angelo Faenza, Jr., Persona general manager at Assa Abloy Americas (New Haven, Connecticut), commented:
The level of attention given to security concerns varies from school to school.- Angelo Faenza, Jr.
He continued:
In many universities there is a committee, led by the school’s security director, devoted to this topic. But, unfortunately, in other schools, security is a noise.- Angelo Faenza, Jr.
He explained:
This is often because there is no budget or simply because there is no one to drive an initiative to upgrade security.- Angelo Faenza, Jr.
According to Jeremy Krinitt, general manager at Frontier Security, Miamisburg, Ohio):
Increased scrutiny [of] security on campuses . . . has led to greater planning and preparation for security concerns.- Jeremy Krinitt
Krinitt added that the job is never done.

Regulations

Campus security has been driven in part by mandates from outside the campus.
Jack F. Dowling, CPP, PSP, president and principal consultant at JD Security Consultants, LLC (Downingtown, Pennsylvania), said:
Regulations, both federal and local, have increased during the past 25 years, beginning with the federal Clery Act in 1990. Many security professional organizations have developed standards and guidelines for campus security.- Jack F. Dowling, CPP, PSP
He mentioned two organizations, namely:
  • the International Association of Campus Law Enforcement Administrators (IACLEA; (West Hartford, Connecticut)
  • ASIS (American Society for Industrial Security) International (Alexandria, Virginia)
Dowling added:
Likewise, litigation involving colleges and universities for inadequate, failed, and negligent security has proliferated.- Jack F. Dowling, CPP, PSP
Brian McIlravey, CPP, co-CEO of PPM 2000, Inc. (est. 1988), a system software company (Edmonton, Alberto, Canada), said:
Managing liability is one of the highest priorities for any organization. Campuses are always looking for new methods to limit their liability and are recognizing that incident management software is a vital resource to limit liability.- Brian McIlravey, CPP
He continued:
This provides a method for documenting incidents and analysis of the data collected in order to investigate trends and patterns on campus and help prevent further incidents.- Brian McIlravey, CPP
McIlravey added:
This type of software is also very important from a reporting perspective, as it documents incident response and follow-up, including the who, what, where, when, and why of every incident.- Brian McIlravey, CPP
The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, in fact, requires colleges to keep and report information about crime on or near their campuses.
Compliance is monitored by the U.S. Department of Education in Washington.
Penalties may be imposed for infractions, and institutions may be suspended from federal student financial-aid programs for failure to comply. Institutions must publish and distribute an annual campus security report.
A negative report with a high incidence of crimes might impact enrollment, giving institutions additional incentive to limit those incidents through tighter security.
The Clery Act, signed in 1990, was originally known as the Crime Awareness and Campus Security Act. The current version of the law is named for Jeanne Clery (1966-1986), a 19-year-old college freshman at Lehigh University in Bethlehem, Pennsylvania, who was raped and murdered in the university’s Stoughton Hall in 1986.

Issues And Challenges

Increased campus security, according to Bosch’s John Wekenborg, raises a number of issues, namely:
  • technical
  • financial
  • ethical
  • regulatory
Wekenborg said:
Every campus faces ongoing technology challenges. When campus networks were designed, they were designed for education and administration purposes, primarily connecting to desktop computers, servers, and the Internet.- John Wekenborg
He continued:
Now, most campuses have gone mobile and are trying to keep up with the growing demand for BYOD [bring your own device]. Then, security comes along with high-definition cameras and network-based access control, asking for space on an already taxed network.- John Wekenborg
Wekenborg added:
The next big challenge is that you do not want your security system hacked; so, there is a need to segment access to the security system from the campus community and the World Wide Web.- John Wekenborg
He concluded:
This requires updated switching and routing infrastructure. Then, once you have all of these systems in place, you have to hire people that are capable of operating and supporting this equipment.- John Wekenborg
Security doesn’t come without a cost.
Wekenborg noted:
The upfront cost of the security systems is funded through a variety of grants, capital improvement projects, and endowments. One college fraternity/sorority ran a fundraiser to purchase cameras.- John Wekenborg
Raising funds to purchase and install equipment is just the first step, however.
Below are some of the other concerns, according to Wekenborg:
  • “You have to look at [the] total cost of ownership.”
  • “You have to pay for people to operate and support these systems.”
  • “You have bandwidth costs.”
  • “You have software and hardware maintenance agreements.”
He said:
The servers need to be in a climate-controlled area. This means air conditioning costs.- John Wekenborg
Privacyis another issue.
Wekenborg explained:
Most jurisdictions have laws in place that define what the levels of expected privacy are. They direct us by defining when audio can or cannot be used, where cameras can be placed, and what type of signage is required when these devices are being used.- John Wekenborg
He added:
Most campuses that are using these systems will restrict who can have access to recorded video and access-control data. No one wants an incident that is under investigation showing up on YouTube or Twitter.- John Wekenborg
Ajay Jain, president and CEO of Quantum Secure (San Jose, California), noted:
The Family Educational Rights and Privacy Act [FERPA] regulations ensure the privacy of student records, and information to confirm compliance related to physical access is required in case of an audit or other compliance issue.- Ajay Jain
He explained:
To meet these and other regulatory requirements, school administrators rely on a variety of tools, including auditable records that show who had access to restricted areas on campus-whether it’s a data center or a location with physical records.- Ajay Jain
Jain concluded:
In general, automated, rules-based monitoring, enforcement, and reporting of compliance requirements meet these regulatory demands while also increasing the safety of students, faculty, and staff.- Ajay Jain
Ethical considerations must balance the need for security, the expectation of privacy, and the desire for an open campus environment in which opinions can be freely expressed.
Jeremy Krinitt of Frontier Security said:
The ethical questions rest more in the use of the information generated from these solutions, just as we see in the debate around personal information on the Internet.- Jeremy Krinitt
He added:
Campuses must look closely and provide clarity about the policies regarding the use of security information, just as they do with other personal information.- Jeremy Krinitt
Finally, building codes dictate where and how access control and fire alarms can be used.
Wekenborg said:
Local jurisdictions will define where and how video and audio can be used. There are no federal regulations that tell a campus they must do certain things when it pertains to a security system.- John Wekenborg
He added:
Homeland Security and the FBI have published documents with recommendations for campus security, but they are recommendations only.- John Wekenborg
Steve Surfaro, security industry liaison at Axis Communications (Chelmsford, Massachusetts), said:
There are numerous evolving standards and best practices that provide guidance in the design of campus security systems.- Steve Surfaro
He added:
One recent example is the State of Connecticut’s Report of the School Safety Infrastructure Council, revised and updated [on] February 4, 2014. This standard provides guidance for surveillance and access-control design and deployment in campus facilities.- Steve Surfaro

High-Tech And Low-Tech

Technology predominates in any current discussion of security measures on campus, but more traditional methods are far from obsolete.
Fernando Pires, vice president of sales and marketing at Morse Watchmans (Oxford, Connecticut), said:
We tend to focus on protecting the hundreds or thousands of physical keys that are used daily on campuses.- Morse Watchmans
He added:
There are many reasons to make planning for control and management of those keys a fundamental component of campus security programming.- Morse Watchmans
Like physical keys, technology-based security solutions are useful, but they have their limits. For example, while access control and surveillance technology are important, they are only the starting point of any program, according to Brian McIlravey of PPM.
He said:
For preventing and mitigating risk, the importance of good incident-management software cannot be overstated.- Brian McIlravey
Ajay Jain of Quantum Secure agreed, saying:
Software can analyze data from thousands of endpoints, such as door readers, access points, alarms, and related personnel. Analyzing the data determines trends, weaknesses, and opportunities, and provides a graphical dashboard view of the state of a campus security infrastructure.- Ajay Jain
He further commented:
Managing identities in the campus environment is a challenge, but new physical identity access management [PIAM] software systems help meet the challenge by creating a single identity to be used in multiple systems campus-wide.- Ajay Jain
Jain continued:
Software systems can streamline time-consuming and inefficient processes in the campus security environment, from issuing I.D. badges to managing databases to assigning access privileges across multiple physical access-control systems.- Ajay Jain
He added:
As well, any activity, event, or status at any point in the identity lifecycle is reportable and auditable. If vulnerability is identified, school administrators can review and take the necessary action to rectify procedures or activities.- Ajay Jain

Video Management

Similarly, according to Gadi Piran, president of On-Net Surveillance Systems, Inc., or OnSSI (Pearl River, New York):
Video-management software [VMS] systems are a central component of IP [Internet protocol] surveillance. VMS systems are designed with efficiency tools.- Gadi Piran
Such tools include, as stated by Piran:
  • “touch-screen technology”
  • “map-based interfaces”
  • “context-sensitive pop-up controls”
  • “time-slice forensics”
He added:
Combined with an event-management platform, VMS systems integrate with an array of physical security solutions . . . to provide the information to safeguard the campus and make informed decisions.- Gadi Piran
Piran said that these “physical security solutions” include the following:
  • “alarms”
  • “access control”
  • “intrusion detection”
  • “video-content analytics”
  • “license-plate recognition”
  • “other systems”
He also said:
While a full complement of well-placed high-definition [HD] and high-megapixel video-surveillance cameras can provide situational awareness, incidents do not always take place between the hours of 9 and 5 when the control room might be fully staffed and able to monitor events.- Gadi Piran
He continued:
To address this, new VMS technology enables standard definition and HD/megapixel cameras to stream at full-frame rates over low-speed connections or limited-bandwidth networks.- Gadi Piran
Piran added:
Video streams through the cloud can be monitored at full-frame rates (with less than one-second lag) including the ability to digitally control pan, tilt, and zoom functions. Streams can then be encrypted to enable a secure connection both inside and outside a school network.- Gadi Piran
He explained:
High-Definition Interactive Streaming [HDIS] technology makes mobile devices part of the solution, with full-motion playback of up to 16 HD video streams of live or recorded video, at their original frame rate, with PTZ [pan-tilt-zoom] control over limited bandwidth network connections, such as 3G and 4G cellular.- Gadi Piran
He concluded:
Individuals in the field can view video and alerts on a smartphone or tablet or use their device to send video images of an incident in progress.- Gadi Piran

Access Control

Brian McIlravey of PPM said:
Access control is another high priority; however, due to costs this will be an ongoing topic for the next 10 years and beyond.- Brian McIlravey
He explained:
Many campuses are moving to the use of smart cards which can be used across the campus for access control as well as libraries, transportation, food, and other services.- Brian McIlravey
Smart card technology is by no means universal.
Brett St. Pierre, director of education solutions at HID Global Corp. (Houston, Texas), said:
Most universities currently use magnetic-stripe cards or low-frequency (125 kilohertz/kHz) cards, often known as proximity (or prox) cards. While these cards have clearly been popular choices in the past, they simply do not provide the level of security or adaptability that are needed to protect campuses as security threats continue to evolve.- Brett St. Pierre
He continued:
The best way to protect students, faculty, and staff is with high-frequency contactless smart card technology that uses mutual authentication and cryptographic protection mechanisms with secret keys and a secure messaging protocol delivered on a trust-based platform.- Brett St. Pierre
St. Pierre noted:
There has been an increasing university trend toward using stronger authentication contactless smart cards on campus to increase card protection.- Brett St. Pierre
He added:
Some campuses have immediate concerns that accelerate adoption, while some choose to start the migration by deploying combination readers for new buildings or combination cards for incoming freshmen. Either way, these campuses are preparing for the future and will end up with a complete migration over time.- Brett St. Pierre
St. Pierre also said:
The latest access-control platforms are designed to make it significantly easier to secure more doors, with more flexibility and adaptability, using a combination of smart cards and mobile devices, such as smartphones. Plus, the platform enables students, faculty, and staff to do more with these cards and devices than just open doors.- Brett St. Pierre
Through the platform, St. Pierre said that the following things can also be done:
  • “making cashless meal plan purchases on and around campus”
  • “checking out library materials”
  • “paying for parking”
  • “accessing transportation services”
  • “monitoring time and attendance”
He made additional comments about the said technology, saying:
Perhaps the biggest impetus for the proliferation of security solutions, though, was the advent of combination reader platforms. It is difficult to do a rip-and-replace upgrade of existing technology.- Brett St. Pierre
He concluded:
When multi-technology readers became available, it gave universities the ability to read current card technology as well as future smart card technology. With the latest series of readers, universities that have not yet made a smart card platform decision have much more flexibility to choose from a long list of smart cards.- Brett St. Pierre
J. Kent Schrock, account and marketing executive of the currency handling and identity product solutions at Fujitsu Frontech North America, Inc. (Foothill Ranch, California), confirmed the move toward smart cards.
He said:
Whether it is access to sensitive areas of the campus like data centers or protected access to buildings for only students, staff, and faculty, we are beginning to see a shift away from older forms of access like tokens, cards, and PINs, to more secure methods of identification like biometrics.- J. Kent Schrock

A Systems Approach

Bringing together the various elements that comprise a security system is the challenge colleges and universities are facing.
A successful security system will be created in layers using a variety of technologies along with well-trained personnel, according to Bosch’s Wekenborg.
He said:
Each item or system has its own job to do. No one system is more important than the other. When implemented properly, each system will complement the other, creating a complete, integrated security solution.- John Wekenborg
But, despite the attention given to new technology, the human part of the equation cannot be ignored, according to Angelo Faenza, Jr. of Assa Abloy Americas.
He said:
You need people who value and want to use that data. Knowing who is going in and out of a building and not doing anything with that information is useless.- Angelo Faenza, Jr.
Faenza also gave this reminder:
If you have a break-in and don’t use the audit trail capability, you are not leveraging that technology.- Angelo Faenza, Jr.
He added:
In many situations we have seen how the deployment of a card technology for access control can help change the culture with the students.- Angelo Faenza, Jr.
Faenza concluded:
When everyone becomes responsible for his or her security and feels accountable for others around him or her, they are more likely to comply. This can be as simple as not using your card to allow people you don’t know into a building.- Angelo Faenza, Jr.
John Wekenborg agreed with Faenza, saying:
In a campus environment, a security system is not just hardware and software. It is a well-defined plan with processes and procedures that allow you to react proportionately to the information that you are receiving from the electronic systems and community.- John Wekenborg
He added:
The security hardware is a tool. This tool can make your security and administrative staff very efficient. It can be a deterrent. It can also help to reduce man hours and investigative costs, but without the brains behind the machine, all you have is a tool.- John Wekenborg
Along the same lines, Jack Dowling of JD Security Consultants commented:
Security technology on campus is only as good as those who use the technology and those who monitor and respond to the technology.- Jack Dowling
He explained:
Security at a college and university is a shared responsibility. For example, the campus community must use the blue-light emergency phones to notify the campus security and police of suspicious or criminal activity, and the campus security and police must be immediately available and provide a prompt response.- Jack Dowling
Dowling concluded:
A failure of either party will render the security technology ineffective.- Jack Dowling
Finally, PPM’s Brian McIlravey also commented:
In a recent student survey regarding campus safety, one of the number-one recommendations is officer presence. There is still a strong need to see staff.- Brian McIlravey
He added:
Technology alone cannot solve all the issues related to safety on campus. At the end of the data trail there will always be a need for people to recognize and respond to danger, analyze trends, and make changes and recommendations for improving safety based on information provided by the technology.- Brian McIlravey

Final Thoughts

Each campus has its own unique set of circumstances, needs, and financial limitations.
The job facing those who must design and administer security systems is in balancing these factors to provide the most inclusive security practical for their particular institution.
It’s when technology delivers security to campus that shows when school administrators take such matters seriously.
Jump to
George Evans

George Evans

Author
George Anderson, an exceptional architectural designer, envisions and brings to life structures that transcend the realm of imagination. With an unwavering passion for design and an innate eye for detail, George seamlessly blends form and function, creating immersive spaces that inspire awe. Driven by a deep appreciation for the interplay of space, light, and materials, George's innovative approach redefines the possibilities of architectural design. His visionary compositions leave an indelible mark, evoking a sense of wonder and transforming the built environment. George Anderson's transformative designs and unwavering dedication continue to shape the architectural landscape, pushing the boundaries of what is possible and inspiring generations to come.
Latest Articles
Popular Articles