Office building security

February 2007 Integrated Solutions

There are more than one million office buildings in the United States, ranging from small one-storey buildings, to low-rise office parks, to towering skyscrapers. Increasingly, more and more Americans spend a significant part of their lives working in such buildings. And businesses increasingly house their most important assets – their employees and their sensitive printed and electronic information – in such buildings.

However, just like bank robbers who rob banks because that is where the money is, many criminals go to office buildings to steal, assault, rob, rape and spy because that is where their potential victims - companies or individuals - are located.

This brief article will provide the reader with guidance on some basic issues concerning securing office buildings in America today. It should not be relied on as the sole basis for a complete security plan, and does not contain legal advice. Readers should consult their attorney or security professional for advice about their specific situation.

How likely a target is your building?

Where you are located and how attractive a target you are perceived to be by criminals and even terrorists will, in large part, determine how likely you are to actually be targeted. And how potential criminals and attackers perceive your building depends, in part, on their assessment of their potential 'gain' versus the visible security measures you have. In other words, what is their likelihood of success versus their risk of going to jail? Often an apparently 'lucrative' building that is well-protected will be by-passed in favour of the less well-secured building, which may be viewed as 'easy.'

In a commercial building, security risks come from both outsiders and building and tenant employees, and may include murder, robbery, rape, assault, theft, fraud, commercial espionage, arson, vandalism, bomb threats, workplace violence and (displaced) domestic violence, plus sabotage against the building owner or a tenant, to name but a few. The heavy concentration of people and property, coupled increasingly with 'open' floor plans, makes modern office buildings susceptible to these types of threats. Plus, the always-present risks of fire, explosion and natural disasters have to be considered in building design, construction or rehab, and security programme development.

Architects, contractors and management responsible for designing or implementing security in any commercial building should first identify the assets (including people) to be protected, along with the likely threats to the facility. For example, in a standalone fast food facility, the threat of an armed robbery may be high; it would be less, however, in a two-storey office building housing doctors (and possibly drugs); and even less in small office buildings housing mainly accountants and similar 'low-risk' tenants. A survey of all present or potential tenants should be made to ascertain what type of business each is or will be conducting; what significant business assets are present; and which businesses, if any, may constitute an increased risk to both the building and specific tenants from criminals, political activists etc. A single high-end jewellery store can significantly increase risks. If not yet built, the developer should have a good idea of the type of tenants it hopes to attract.

The building threat assessment should include a review of any known past crimes in the building (if it is built and operating), along with an evaluation of the type and rates of crime in nearby office buildings and in the immediate area. Local law enforcement will usually provide area data. In a dense 'downtown' area, several blocks in each direction should be evaluated.

There is, unfortunately, no 'cookie-cutter' plan that will secure each and every type of office building. Some security measures can be designed into the building plans and installed during construction or renovation; others will need to be developed, then implemented or installed after tenants have been identified and operations begun. Developers and management of each building will have to identify their specific security needs, starting by conducting a risk assessment.

Security risk assessment

A security risk assessment (an exhaustive examination of the existing building and any surrounding property including a review of the building plans and any security processes, policies and procedures) should be conducted. Local laws and codes pertaining to security measures, fire life-safety codes, and building evacuation requirements should also be reviewed. Observations of the building site should be made at various hours of the day and night and also on weekends to determine 'customary' activities and traffic patterns. Based on the identified threats, plus any identified gaps or shortcomings in security (vulnerabilities), developer/owner/management can start to develop an overall security plan, including cost-effective counter-measures.

Where management does not have qualified expertise on staff or such staff is not readily available to conduct a security survey due to other commitments, an independent, non-product affiliated security consultant should be retained to assist.

Crime prevention through environmental design

Many security professionals advocate the use of crime prevention through environmental design (CEPTED) principle to reduce crime risks. Multiple studies suggest that most criminals select their targets using a rational (to them) decision-making process that is influenced largely by the criminal's perception of target availability and vulnerability. Most criminals want an 'easy' target, and do not want to be identified committing their crime. Accordingly, CEPTED principles are based in part on:

* Natural surveillance - reducing 'blind spots' and other measures to increase the ability of occupants and casual observers (police on the outside and legitimate visitors inside) to see and monitor persons and activities. This includes sufficient numbers and size of windows for visibility in and out, along with low shrubs and high tree canopies so as not to obstruct visibility.

* Territorial reinforcement - establishing some sense of 'psychological ownership' and responsibility among building tenants and employees so as to increase their vigilance, and the likelihood that they will defend 'their' property against incursion by challenging intruders or reporting suspicious acts.

* Natural access control - using doors, walls, shrubbery and other natural or manmade obstacles to direct vehicle and pedestrian traffic to limited numbers of controlled access points. Isolated or 'risk' areas such as loading or delivery docks should receive special attention, including increased lighting, locking, and observation (patrol, alarm, or when a building security staff is present, closed circuit television (CCTV) - all to deter or prevent unauthorised access to the building while monitoring activities.

* Maintenance and management - owners/operators taking steps to ensure that the building looks well cared-for and crime-free in such areas as lighting, paint, signage and the prompt repair of broken or defaced items. This sends a message to criminals, and others, that someone cares and is 'looking out' for and responsible for the building.

Parking and adjacent spaces

Special attention should be given to any underground, adjacent, or attached parking spaces, surface lots or garages. These are frequent targets of criminals committing theft from and of automobiles, plus robbery, rape, and car-jacking (all sources of lawsuits against building developers, owners and operators). Good lighting will deter many criminals.

Access control

Because most security incidents occur inside a building, special attention should be given to controlling building access. While tenants and visitors require access, freedom of access to buildings and particular offices in them is also very important to criminals. The nature and level of access control (along with visible security measures such as CCTV cameras in office building lobbies, hallways and garages) also establish the building's security culture or 'image,' which is important in deterring some criminals.

In cases of small office buildings, management frequently leaves the doors open for tenants and visitors. If the risks are relatively low, this may be acceptable during the office-day. Locks on all exterior doors that are closed and locked at night should always be of high-security commercial grade, with their exterior hinges 'pinned' or welded to prevent removal. Because the perimeter access points to the building are not well controlled, interior doors to individual offices should also be of high security materials and locking devices. Do not forget the frames in which the doors are set, as the doors are no stronger than their weakest part.

As an alternative in buildings with only a few tenant employees, general building access might be controlled with each employee having a key, or a card-key operating a simple front and back door electronic access system. Visitors and delivery persons would have to use a building directory intercom to seek admittance. Depending on the system, tenants would then remotely 'buzz' visitors in (convenient, but not very secure), or be required to physically go to the lobby or entry door to admit visitors.

Where stricter access control is necessary, buildings might use a receptionist or security officer (proprietary or contract guard company) to screen all visitors and employees. Where there are more than 75 employees or there is high turnover in employees, then use of a building or tenant-issued photo ID card for visual screening is recommended. An alternative, especially in larger buildings or those with higher risk, is use of an electronic card access control system by all tenants. When card access systems are used, employees/tenants can be processed automatically through one or more access-lines, while visitors can be directed to a special line for screening and bag search (if desired or required). Temporary (time expiring) badges could be issued to visitors who have been 'approved' by tenants, or for access to 'public' offices.

Note that most mid to large office buildings (five or more stories) will require a combination of technology and manpower to adequately address their security needs. Systems and hardware alone will not accomplish the entire task, and neither do guards. Integrating both into a comprehensive security plan is frequently required.

Special attention should be given in all buildings to 'common areas' such as lobbies and hallways. Because they are often used to facilitate thefts or sexual assaults, both men and women's restrooms should have lockable doors requiring key access.

Attacking the building

Malicious vandalism and major damage by disgruntled building or tenant employees might be directed against the building itself, rather than directly against the tenants or their property. Management should secure access to the building ventilation system and electrical and telephone rooms, including any access points on the individual floors. Accessible utilities (water, power and gas) on the property but outside the building should also be secured. Openings permitting access to the building from the roof should be secured against entry from the outside if the roof is accessible from nearby (within 5 metres) buildings or trees.

Emergency planning

Every office building should have an emergency plan that mitigates the impact of any security breach or other disaster. Special attention should be given to developing and practising building evacuation plans. While evacuation drills for fire and bomb threats are inconvenient, they are critical to life-safety and should be performed at least once each year. Building tenants and employees are constantly changing. They are less likely to panic in an emergency if they have gained confidence by practising evacuations and know what to do. And lives will be saved!

Periodic review

Finally, whatever security plan is developed and implemented, it should be periodically reviewed to ensure that it is in fact operating the way it was originally designed by the developer, architect and operator, and that it continues to adequately address the changing threats to the building and its tenants. If management does not have the in-house capability to do so, a non-product affiliated security consultant should be retained to assist with the security review or audit, and to provide an independent, un-biased viewpoint.

Today, it is not enough just to be prepared for office building emergencies. In the wake of 11 September, building tenants, employees and visitors are seeking a sense of order and predictability in their workplace and security against criminals and other controllable threats. This requires a comprehensive and continuous approach to security by building developers and management, from the design phase through daily operation.

Disclaimer:

This article is based on generally accepted security principles, and on data gathered from what are believed to be reliable sources. This article is written for general information purposes only and is not intended to be, and should not be used as, a primary source for making security decisions. Each situation is or can be unique. The author is not an attorney, is not engaged in the practice of law, and is not rendering legal advice. Readers requiring advice about specific security problems or concerns should consult directly with a security professional. The author of this article shall have no liability to any person or entity with respect to any loss, liability, or damage alleged to have been caused by the use or application of any information in this article.

For more information contact Ralph Witherspoon, Witherspoon Security Consulting, +440 779 3803, [email protected], www.security-expert.org





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...