LAW, PROCEDURES AND SECURITY MANAGEMENT: Security, Data Protection and Privacy
Security Procedures
7
Security Procedures Dec. 2013 Update
-
Upload
ian-strever -
Category
Business
-
view
185 -
download
0
Transcript of Security Procedures
![Page 1: Security Procedures](https://reader031.fdocuments.us/reader031/viewer/2022020314/58ee18481a28ab49258b45e5/html5/thumbnails/1.jpg)
Security ProceduresDec. 2013 Update
![Page 2: Security Procedures](https://reader031.fdocuments.us/reader031/viewer/2022020314/58ee18481a28ab49258b45e5/html5/thumbnails/2.jpg)
Weekday Access
● 6 AM - 11 PM● Door access for students
○ 7 - 7:55 AM○ 2:20 - 2:45 PM
● Alarms disarmed and armed by custodians
![Page 3: Security Procedures](https://reader031.fdocuments.us/reader031/viewer/2022020314/58ee18481a28ab49258b45e5/html5/thumbnails/3.jpg)
Weekend/After Hours Access
● 6 AM - 11 PM, Limited Entry Points● Two-part process
○ Door Access○ Alarm Access
● Sign-in, Sign-out
![Page 4: Security Procedures](https://reader031.fdocuments.us/reader031/viewer/2022020314/58ee18481a28ab49258b45e5/html5/thumbnails/4.jpg)
Entry Points
![Page 5: Security Procedures](https://reader031.fdocuments.us/reader031/viewer/2022020314/58ee18481a28ab49258b45e5/html5/thumbnails/5.jpg)
Four Alarm Zones:
![Page 6: Security Procedures](https://reader031.fdocuments.us/reader031/viewer/2022020314/58ee18481a28ab49258b45e5/html5/thumbnails/6.jpg)
Enter, then Disarm● 60 seconds to
disarm● 4-digit code
required● “Enter” to disarm● “Away” to arm
![Page 7: Security Procedures](https://reader031.fdocuments.us/reader031/viewer/2022020314/58ee18481a28ab49258b45e5/html5/thumbnails/7.jpg)
Alarm Protocol
● Sign in on the white board ● Erase your name when
you leave or arm the system