StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

University Building Security Plan - Case Study Example

Cite this document
Summary
"University Building Security Plan" paper provides a feasibility study for the University security systems that are going to be implemented in a new building. The paper also addresses some of the controls that need to be considered for the project to turn out as a success…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful

Extract of sample "University Building Security Plan"

University Building Security Plan Table of Contents 1.0 Introduction …………………………………………………………………………………3 2.0 Project Initiation ……………………………………………………………………………3 2.1 Objective …………………………………………………………………………….3 2.2 Scope …………………………………………………………………………………3 2.3 Approach …………………………………………………………………………….4 2.4 Deliverables …………………………………………………………………………..4 3.0 Initial Business Case …………………………………………………………………………5 3.1 Background ………………………………………………………………………….5 3.2 Benefits ……………………………………………………………………………….5 3.3Risks …………………………………………………………………………………..6 3.31 If the project is not undertaken ……………………………………………………6 3.32 Risks associated with the project ………………………………………………….6 4.0 Project Organization …………………………………………………………………………6 4.1 Project governance …………………………………………………………..………6 4.2 Key Stakeholders …………………………………………………………………….7 5.0 Project Plan …………………………………………………………………………………..8 5.1 Project Schedule ………………………………………………………………………8 6.0 Project Resources/Budget ……………………………………………………………………9 6.1 Project resource requirements ………………………………………………………9 6.12 Project Non-Resource requirements ………………………………………………10 6.13 Projects Expenditure ………………………………………………………………..11 7.0 References ……………………………………………………………………………………13 Executive Summary 1.0 Introduction The main purpose of this document is to provide a feasibility study for the University security systems that are going to be implemented in a new building. The document will also address some of the controls that need to be considered for the project to turn out as a success. This particular security systems feasibility plan will also delineate on responsibilities and expected behaviors for the individuals who will be using the security systems in all sorts of ways. Therefore this security systems feasibility plan should be viewed as a documentation of the structured process that will be used to plan for adequate, cost effective security protection for human and tangible assets that will be found within the vicinity of the university building (CPI, 2008,p.2). Each security plan is developed in accordance to the guidelines set forth by the university guide for establishing such security plans together with the applicable risk mitigation strategies. 2.0 Project Initiation 2.1 Objective The objectives of this particular brief are to outline the University security systems plan. Security systems here refer to the technological products that are used to safeguard unauthorized access and intrusion of the university buildings, or other tangible and non-tangible assets like information (Security Bureau, 2000, p.3). This plan will mainly dwell on the security systems that are required within the university building. Our plan is going to be consistent with the entire campus wide plan pertaining to security system and security in general whereby this particular security systems plan has also been established in consultation with the campus chief information security officer (Fennelly, 2003, p.106). In order for success to be achieved, this particular plan will be geared towards identifying potential security threats and devising mitigation mechanisms before security breaches happen. This is so because proper security mechanism should safeguard personnel, prevent unauthorized access to equipments, facility, information, sabotage and damage by devising various active and passive measures (Roper, 1996, p.1). 2.2 Scope The scope of this particular plan will focus on the below areas: College assets within the university building Safeguarding students and workers within the new building from crime and any other violent activity Student’s assets such as laptops and mobile phones University specific information such as student’s academic & employment information Teaching and non-teaching staff information Technological infrastructure that support the computing needs of the new building 2.3 Approach The university is going to implement the following approach to ensure that there is compliance with security systems requirements. Identifying and tracking the security hazards. Identifying system security installation procedures and design criteria that are in line with the security philosophy established by the university to counter threats and vulnerabilities to the university. Interacting with design engineers throughout the entire design stage of any new facility being established in order to ensure that sound security concepts are involved. Elaborate plan of specific tasks which will encourage receiving of feedback in the best manner possible so that they may be included into designing and manufacturing at the early stages in order to avoid delaying the plan and incurring additional costs. Interacting with Project managers during the project phases in order to ensure that the unit designs integrate properly with the overall system security requirements. Acquiring products that are certified with relevant bodies Going for products that are energy efficient so that we may have a “green campus” Testing the main system together with its modules including all the security aspects Documenting the project phases Monitoring the security systems program (Smith, 2008, p.5). 2.4 Deliverables This particular project plan has several deliverables which include: Development and approval of the security plan Identifying appropriate personnel who are going to assist in creating the project teams Identifying the project champion in this regard he/she shall be the Project Manager Compiling security specific policy similar to other university buildings Identifying the various categories of the university users whereby the roles and responsibilities of these people shall have to be defined accordingly Establishing a policy that identifies and outlines roles and responsibilities for the university building users by their category of the users 3.0 Initial Business Case 3.1 Background The new university building is expected to be completed by summer 2012 and that’s when it should be officially opened to be used. This building is expected to be used by teaching, non- teaching staff, students and other visitors. It I due to this background that the security of the facility is of paramount importance because of the facilities that are going to be installed in it, not mentioning other small assets such as student personal items, computers in the building, furniture and more over crucial university information assets (Kelley, 2005, p.24). Crime is also very common nowadays, and university compound are no longer exception, there have been numerous cases where people have died in campuses and we would not like to take any chances with the security of the institution (CSO, 2007, p.20). All these have to be properly safeguarded so that the institution can maintain its prestige as a safe environment to live, work, and learn and also to succumb to the pressures from key institutions that are pressurizing universities to have adequate security programs (Fisher & Sloan, 2007, p. 285). 3.2 Benefits When this plan is fully completed and implemented, it will bring forth a number of benefits which will include: The university buildings will be secure from physical thefts which may affect both the students and teaching by giving them additional unnecessary expenses Both teaching, non-teaching staff, and students will stay in a secure environment which will give them peace of mind and enable them to concentrate fully on their mission Automated security mechanisms will save on time because the university will not have to employ a security guard who will spend a lot of time conducting manual jobs such as registration of students because they already have an automated way of knowing who entered and exited the building during some specific time courtesy of the biometrics and smart card technology. The university will save money because they do not have to replace assets such as computers regularly because they are in a safe and secure place (Rengert, Mattson & Henderson, 2001, p.14). 3.3Risks 3.31If the project is not undertaken Intruders may come to the building and cause damages such burglary of both the university and student assets such as electronic equipments (Smith, 2008, p.10). University secrets may be compromised by outside intruders Teaching, non-teaching staff and students do not fully concentrate with their mission because of the security. It may be hard to control the population coming in and out of the building due to the manual procedure of registering people which could waste a lot of time not mentioning the amount of money being saved by the institution as a result of enhanced efficiency (Purpura, 2007, p.146) The university might be legally liable for security incidences that affect occupants of the buildings which might lead the institution compensating victim’s huge sums of money that may end up affecting the entire institutions financial cash flow. Without the systems it might be very difficult to track students and they might take advantage of absconding classes (Davies, 2007, p.377). 3.32 Risks associated with the project This particular document which is defining the security procedure of the university building may be perceived as unnecessary hence “lip service” in addressing security requirement, or creating additional workloads with minimal or absolutely no payoffs at all . Lack of seriousness with the implementation 4.0 Project Organization 4.1 Project governance The project will report to the Chief security officer. The Chief Security Officer will then recommend the proposed policy document to the University Security committee for campus approval and mandate. 4.2 Key Stakeholders In order to ensure the security of the students, employees, and the university staff, the college is mandated to fulfill its responsibility by using a carefully chosen system that comprises combinations of Personnel, system security procedures and security product technologies. The security will be accomplished with personnel and technological surveillance. Chief of Security He will be mandated to co-ordinate and integrate various security efforts within the building. She/he will also be the overall in charge of security at the entire campus thus will be mandated to devise and oversee the implementation of the new university building security systems. He will also establish the change management team (Smith, 2008, p.7). Security officer Will have the overall responsibility of the respective university building and will have one on one access to all the key personality within the building and incase of an emergency he/she is mandated to notify all the key personnel and police. He is expected to work hand in hand with the project manager and should report his/her findings to the Chief of Security. He should have the authority to investigate crime as well as student’s code of conduct (Kaplin & Lee, 2007, p.385). Security Personnel There will be security officers who will be equipped with radios and will be constantly monitoring the radio channel. This will enable these officers to monitor any potential threat or incident and report to the security supervisor. These security personnel will also have to be conversant with the deployed security systems technology and these people will report directly to the security officer. Security forces The security personnel will collaborate with the police so that they may professionally handle security incidents. These groups of people will assist in the investigation of incidents and they may apprehend and investigate culprits on behalf of the university (CPI, 2008, p.3). Students They will be required to undergo security test periodically. Incase of any emergency they will be required to call the security personnel via telephones that will be installed throughout campus. University Employees This includes both the teaching and non-teaching staff that will also have to undergo and pass some series of security test so that they may be declared free to use the facilities within the university building. This is so because the university is trying to nurture a crime free zone and it would not make any sense if some of their staff have criminal history (Smith, 2008, p.8). 5.0 Project Plan 5.1 Project Schedule Major Tasks/Milestones Start Date End Date Establishing and adopting policies similar to the other University buildings while also identifying and outlining roles and responsibilities for all the building users. Identifying the team members and establishing the project team Compiling related policy from other university buildings Developing and approving the project plan May 2011 August 15th 2011 Identifying the different t categories of building users in which their roles and responsibilities will also have to be defined Establishing a policy that identifies and outlines the roles and responsibilities for al the building users, by category of user whereby one individual may have more than one role August 16th 2011 January 2012 Phase 2: Establishing an implementation program to educate the building users on this policy pertaining to their roles and responsibilities under it Developing and approving the project plan Identifying team members Establishing an educational program that is targeted towards each specific category of the building user (Carrol College, p.18) January 2012 May 15th 2012 Phase 3: Selecting the types of systems that will be installed from different vendors Identifying the equipments to be installed Inviting request for proposals Short listing tender documents Awarding the tender May 17th 2012 July 15th 2012 Phase 4: Deploying and testing the security systems (Lewis, Farris & Greene, 2004, p.31) August 1st 2012 September 15th 2012 The vendors will deliver the systems The systems are going to be installed to the building The systems will be tested Respective users will be taught how the systems function 6.0 Project Resources/Budget The table below indicates some of the required resources that are vital for this particular project 6.1 Project resource requirements Project Resources Project Resource Type Roles Start date End date Total cost ($) Project Manager Internal Overseeing the project, supervises the project, acts as the link between the University and the project developments, 1st June 2011 31st Dec, 2012 50,000 Consultant External Offering technical support in regard to security systems 5th June 2011 31st Dec, 2012 35,000 Security Officer Internal Responsible for the building entire security and will offer timely policies pertaining to the building overall security 5Th June 5th Dec, 2012 70,000 6.12 Project Non-Resource requirements Here we are going to include some of the most sought after security devices for any building security with CCTV and biometrics being the main technology (NCSC, 2010, p.7; Lepon & Popkin, 2007, p.1; Weiss et al, 2007, p.1). CCTV Camera System (Inclusive of color, digital and recording capacity). Specification Quantity @ Total cost Tilt/Pan/Zoom with exterior camera inclusive of mounting and housing units 1 1500 1500 Tilt/Pan/Zoom with interior camera inclusive of mounting and housing units 1 1200 1200 Fixed exterior camera with mounting and housing units 1 400 400 Fixed interior camera with mounting and housing units 1 250 250 Digital Video recorder-32 channels 4 5000 2000 Flat screen monitor 40 inch 4 1800 7200 Total Amount 12550 Duress Alarm System Device Specification Quantity @ Total cost Alarm Control Panel 1 250 250 Panic Buttons 2 75 150 Wireless Remote receivers 1 550 550 Alarm sirens 1 50 50 Alarm strobe lights 1 40 40 Total 1040 Access Card System Device Specification Quantity @ Total cost Control Panel 1 900 900 Card reader per door 35 600 21000 Systems software 1 1500 1500 Magnetic lock per door 35 300 9000 Emergency exit buttons 35 45 1575 Computers and printing facility 4 800 3200 Total 37175 Overall total $50,765 6.13 Projects Expenditure Internal Resource Costs External Resource Costs Non-resource costs Total costs Project 120000 35000 50765 205765 Contingency (10%) 12000 3500 5076.5 2057.65 Total 207822.65 Detailed Implementation Schedule Major task/Milestones Start date End date Responsible personnel Resources Dependencies Status Notes/comments Governance structures components developed Establishing change management team May 2011 Aug 15th 2011 Chief Security Manager Technical advice from HR division It facilities Available Establishing communication plan Jan 2012 May 15th 2012 Consultant Technical advice from Public relations officer It facilities Available Establishing implementation group Jan 2012 May 15th 2012 Consultant Advice from chief security officer None None Service delivery methods concept defined Compiling overarching reports model of service delivery including cross referencing to price recommendations May 17th 2012 July 15th 2012 Project manager Policy advice from chief security officer None None Obtaining approval of refocused model of service delivery via the available governance structure August 1st 2012 September 15th 2012 Project manager None None 7.0 References 1. Adam Weiss, Anil Ramapanicker, Pranav Shah, Shinese Noble & Larry Immohr (2007). Mouse movements Biometric Identification: A feasibility Study. Proceedings of Student/Faculty Research Day, CSIS Pace University. Retrieved 10th April 2011 from http://csis.pace.edu/~ctappert/srd2007/c2.pdf 2. Bonnie Fisher, John j. Sloan (2007). Campus Crime: Legal, Social, and Policy Perspectives, 2nd Edition. Charles C Thomas Publisher. 3. Carl A. Roper (1996). Physical Security and the Inspection Process. Butterworth-Heinemann. 4. Carrol College. Carrol Community College, Campus security and safety, retrieved 10th April 2011 from http://www.carrollcc.edu/assets/document/security/Crisis%20Management%20Plan%208-2007%20Web.pdf 5. Central Pennsylvania Institute of Science and Technology (CPI). (2008). Campus Security Plan: Annual Security Report, retrieved 9th April 2012 from http://www.cpi.edu/pdf/securityplan08.pdf 6. Chief Security Officer, CSO Magazine (2007). Campus Crisis Response, retrieved 9th April 2011 from http://books.google.co.ke/books?id=LmAEAAAAMBAJ&pg=PA20&lpg=PA20&dq=college+security+feasibility&source=bl&ots=4un923Vwbt&sig=AP6Ta5129cELotFSBhyz_-lYJ78&hl=en&ei=7s-hTbubLtSwhQfUv7WRBQ&sa=X&oi=book_result&ct=result&resnum=2&ved=0CCAQ6AEwAQ#v=onepage&q=college%20security%20feasibility&f=false 7. Dr. Michael Kelley (2005). Information Security Curriculum Feasibility Study for college of Continuing Education, California State University, Sacramento, retrieved 9th April 2011 from http://www.dr-michael-kelley.com/ref%5CIS1002-1.1.pdf 8. George F. Rengert, Mark T. Mattson, Kristin D. Henderson (2001). Campus Security: Situational Crime Prevention in High-Density environments, Criminal Justice Press. 9. J. E Smith (2008). Palm Beach State College Security Plan, retrieved 10th April 2011 from http://www.palmbeachstate.edu/Documents/Safety_and_Security/PBCCSecurityPlan.pdf 10. Jana Lepon & Rachel Popkin (2007). A Study of CCTV at Harvard, retrieved 9th April 2011 from http://www.eecs.harvard.edu/cs199r/fp/JanaRachel.pdf 11. Laurie Lewis, Elizabeth Farris, Bernie Greene (2004). Campus Crime and Security At Postsecondary Education Institutions: Statistical Analysis Report, Diane Publishing. 12. Lawrence J. Fennelly (2003). Effective Physical Security, 3rd Edition, Butterworth-Heinemann. 13. National Center for State courts (NCSC) 2010, Guidelines for Implementing Best Practices in Court Building Security, retrieved 9th April 2011 http://www.sji.gov/PDF/Guidelines_For_Best_Practices_In_Court_Security.pdf 14. Philip Purpura (2007). Security and Loss Prevention: An introduction. Philip Purpura 5th Edition, Butterworth-Heinemann. 15. Sandi J.Davies (2007). Security Supervision and Management: The theory and Practice of Asset Protection, 3rd Edition, Butterwort-Heinemann. 16. Security Bureau (2000). Feasibility Study on introducing a new identity Card and its new supporting computer system, retrieved 9th April 2011 from http://www.legco.gov.hk/yr99-00/english/panels/se/papers/b1251e01.pdf 17. William A. Kaplin, Barbara A. Lee (2007). The Law of Higher Education, 4th Edition, John Wiley and Sons. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(University Building Security Plan Case Study Example | Topics and Well Written Essays - 2250 words, n.d.)
University Building Security Plan Case Study Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/management/2045972-project-feasibility-study
(University Building Security Plan Case Study Example | Topics and Well Written Essays - 2250 Words)
University Building Security Plan Case Study Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/management/2045972-project-feasibility-study.
“University Building Security Plan Case Study Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/management/2045972-project-feasibility-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF University Building Security Plan

Building Construction

When designing a building or refurbishing a building, these engineers develop a plan for fire protection which is not only meant to limit fire to the building of its origin as it was (1900th century) but also to its object or room of its origin.... Buildings as one of the magnificent products of mans… They have a wide range of shapes and functions, and have been modified throughout history for quite a number of factors, from building materials available, to weather conditions, to risk factors, to land prices, Since shelter is a necessity in mans life, buildings can be traced from time immemorial, as the history date it, the early man stayed in the forest just like other animals....
5 Pages (1250 words) Research Paper

Hospital Emergency Operations Plan

This essay "Hospital Emergency Operations plan" dwells on the emergency plan of a hospital.... The emergency plan for the hospital has guidelines for facility evacuation.... In addition, the Hospital Council of Northwest Ohio in collaboration with regional health providers, have initiated a plan for opening a major alternative care facility.... Hence, if one part of the building is unusable, an alternative care site can be located in a different equipped building....
4 Pages (1000 words) Essay

Security of US Capitol Building

A security plan is necessary for such a building to safeguard the building and the office occupants and the public at large against potential bomb explosions, hostage situations and unruly mob situations.... All these potential security risks call for the need to institutionalize a security plan to contain the necessary procedures to be followed in case of such happenings.... Objective The main objective of this security plan is to provide a necessary procedural description of counteractions in case of any of the aforementioned threats materialize....
5 Pages (1250 words) Research Paper

The Physical Security Survey: Wells Fargo & Company

The paper "The Physical Security Survey: Wells Fargo & Company" describes that Wells Fargo & Company has an effective building security program and control in place.... hellip; This security report survey has been on the foundation to identify any form of efficacy in the building's security system and the assessment to enable effective with the security standards to enable optimal security conditions and compliance within the building premises and the building's surrounding....
12 Pages (3000 words) Case Study

Emergency Plan for the Ashford University

The main objectives of preparing an emergency operations plan for the Ashford University are: formulating a task force managing emergency situations, developing a policy for mitigating emergency situations, and assessment of impending risks and disasters.... nbsp; Every jurisdiction within a state is bound to have its own emergency operation plan, provided that it is aligned with the state level disaster management authorities.... The emergency operations plan of any organization must include an outline of the activities that are to be carried out in emergency situations, and it should also define a body or agency of people that are designated to carry out this activity....
10 Pages (2500 words) Term Paper

Technologies for Each of the Building Elements

This work called "Technologies for Each of the building Elements" describes the basement structure for the building.... hellip; To begin with, the chosen site for the construction of the building should be a hill-side loping.... The foundation layout to be adopted for the building is a deep foundation type.... The foundation layout to be adopted for the building is a deep foundation type.... This would take into accounts the entire weight of the building alongside the weight of the motors and other stored pieces of equipment found in the basement region....
9 Pages (2250 words) Essay

Fire Safety Engineering and Building Construction Methods

The paper “Fire Safety Engineering and building Construction Methods” tells that since the last two decades a lot of argument and consideration has been taking place on the topic of an “intelligent building”.... hellip; “An intelligent building is a dynamic and responsive architecture that provides every occupant with productive, cost-effective and environmentally approved conditions through a continuous interaction among its four basic elements: places (fabric; structure; facilities): processes (automation; control; systems): people (services; users) and management and the inter-relationship between them....
6 Pages (1500 words) Essay

The Provision of Fire Safety Systems and Procedures

Everyone in the university, visitors and legal duty to ensure they comply with the law and fire safety provisions stipulated in this fire safety management plan.... Consequently, the objective of this fire safety management plan is to avail of an effective fire safety framework that will be employed to secure the safety and well being of every occupant of JB Firth building and to protect the building's assets (Daniel, 2014).... he building Regulations 2000 (as amended) ...
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us