J. J. Keller® Compliance Network Logo
Start Customizing Your Profile for Free!
Update to Professional Trial!

Experience Everything Compliance Network Has to Offer

Already have an account?
FREE TRIAL UPGRADE!
Thank you for investing in EnvironmentalHazmat related content. Click 'UPGRADE' to continue.
CANCEL
YOU'RE ALL SET!
Enjoy your limited-time access to the Compliance Network Professional Trial!
A confirmation welcome email has been sent to your email address from ComplianceNetwork@t.jjkellercompliancenetwork.com. Please check your spam/junk folder if you can't find it in your inbox.
YOU'RE ALL SET!
Thank you for your interest in EnvironmentalHazmat related content.
WHOOPS!
You've reached your limit of free access, if you'd like more info, please contact us at 800-327-6868.
:
facility-security
facility-security
FOUNDATIONAL LEARNING
Securing points of entry
  • A company should ensure an integrated system of defenses is in place to protect its facility from unauthorized persons.

When it comes to protecting a physical facility from intruders, don’t develop a false sense of security just because there is a fence, security camera, or good lighting. One or two security measures are not going to totally protect any company. It takes an integrated system of defenses to prevent unauthorized persons from entering the facility and causing damage and/or leaving with valuable materials.

Facility layout and condition

The best defense starts with the physical layout and condition of the facility. An organization may need to make physical modifications to its facility to truly protect it. Questions to ask include:

  • Can receptionists see people approaching?
  • Are all entrances and parking lots well-lit and controlled?
  • Are storage areas for sensitive or valuable materials located deep within the facility instead of in remote, dark areas?
  • Could a criminal break into the facility without being seen, whether sneaking over the fence or driving a car straight through it?

The criminal mind can devise sinister, unconsidered methods to accomplish a task. Make sure employees are trained to report suspicious activity or security lapses, and encourage them to offer suggestions for security improvements.