Omnigo's reporting software is widely used by higher education clients to improve security, reduce costs, increase performance, and enhance service levels.
Is your campus Clery compliant? Violation fines start at 35K.
Today's education environments present significant and unique security challenges for security teams; including a broad range of issues and incidents that need to be monitored and documented.
There has been a growing trend within the education sector to ensure the security of both students and staff by adding well trained, fully qualified security industry professionals as part of a physical security presence. These security officers have greatly enhanced the safety of both staff and students, by not only acting as a deterrent due to their physical presence but also by building relationships with the students and staff themselves.
Benefits of Omnigo's Software Solution Suite:
Anonymous Reporting (Whistle Blower).
Improve campus safety and security.
Track individuals trespassed from campus.
Identify students with multiple offenses.
Security Challenges in an Open Campus Environment
Compounding these security challenges is the open nature of the campus environment itself, which is very difficult to manage from a security perspective; i.e. facilities that are very hard to lock down and control, visitors that come and go in classrooms; parents, step-parents, and other family members that visit students and contractors as well as staff members. Add security staff turnover to this environment and it becomes very difficult to monitor and keep everyone informed as to individuals' business and involvement on campus.
Even with the addition of security officers in education facilities, incidents ranging from violent crime, property damage, and vandalism often require additional documentation and even police involvement. These events can be as simple as verbal threats or as complex as weapon involvement. When these events occur, such situations must be handled properly, key individuals are notified, and appropriate best practices are followed and documented.
It is just as important to ensure that an incident is reported and that involved parties' histories have been tracked and documented. This allows for post-event analysis of how the event unfolded, as well as the provision of all potentially related information leading up to the event. By doing so, necessary detailed statistics can be run, allowing security to identify areas and individuals of high risk and re-allocate staff or add other preventative measures to reduce potential future occurrences. This also ensures that security staff has access to historical information on known persons of interest that have caused, or are likely to cause, future situations.
Students also make use of technology broadly in today's classrooms via laptops, cell phones, MP3 players, and the like.
Due to the volume and value of these technologies, thefts have increased resulting in additional incidents of intimidation. Missing or stolen technology can quickly add up to thousands of dollars and other offshoots such as drugs and gangs. Documenting these events and individuals gives security investigators the information required to track down potentially involved parties as well as any known associates while providing a well-documented chain of evidence for expulsion or court prosecution.