To Stay Safe, There Should be a “YOU” in T-E-A-M.

While there’s no “I” in T-E-A-M, there should be a “U” (YOU!) and also an “US” in your security team—so that you can keep your people safe.

You need to surround yourself with a strong team with different skill sets that complement your own expertise so that you can create, enhance, or breathe life into a holistic security strategy.

Who is in charge of security at your organization? Do you have a dedicated security department that regularly conducts training on workplace violence mitigation and response to active shooter incidents, among other topics? Or is security another area added to the myriad of other concerns your HR department is responsible for? And if you are in charge of security for your organization, do you have the support and resources to implement the safety, security, and compliance initiatives you know you need?

Protecting Your People Is Your #1 Priority.
You must have the proper measures in place to protect your employees and visitors, a combination of technical, physical, procedural, and personnel processes effectively in sync to protect your people and warn against potential danger. Start with an assessment of your current security environment so you’ll know what you have and what you lack. And begin to identify people inside and outside your organization who have the skills and knowledge to develop and promote your security strategy.

There’s “HR” in Team, Too.
The scope of the assessment will include HR areas as it identifies the policies you’re missing from a best practice based collection—like an updated drug policy if your state has legalized medical or recreational marijuana, a domestic violence policy that reflects your state’s laws, and an Internet policy that clearly defines company expectations of online behavior and activity. You can work with HR to ensure you have all these as well as safe termination, code of conduct, and access control policies, among others. And be sure you are updating, reviewing, and enhancing them regularly.

“IT” Is Also in Team.
Some organizations give IT oversight of their technical security measures, security improvements might be under IT budgets, or at the very least you might have to coordinate with IT to ensure your alarms, turnstiles, cameras, and card readers are working and talking to each other. Your security technologies systems integrator will also be an important member of your team, confirming, among other things, that all your doors will lock during a lockdown, will deny entry, and will allow your people to exit during an emergency.

Get First Responders on Your Team
You should have a relationship with your local police, fire, and emergency medical personal, which means the first time you meet them should not be during an emergency. These professionals are integral parts of your security team and you can introduce them to your facility so they know how to access it, how many safe rooms you have identified and where the emergency exits are, and who they will communicate with during an emergency.

Plus Consultants, Mental Health Professionals, and Forensic Psychologists
Mental health professionals can lend their expertise to investigations of concerning behaviors that could lead to workplace violence. Forensic psychologists can play a leading role in threat assessments that will contribute to your safe workplace. And if you’re in need of a consultant who can serve as a trusted advisor, we happen to know one. Just call—we’re here to help in whatever way you need us.


5 Areas To Focus On In 2020 To Keep You Safe

You need an enterprise holistic security strategy that protects your people, properties, and assets. Now. Today. If not today then definitely in 2020. Even if you haven’t budgeted for any improvements next year, start envisioning what you want your organization to be like, create your strategy, write your plan, and then start implementing the goals and objectives that will make your vision a reality. These 5 areas will get you on your way to keeping your people safe.

1. Conduct an assessment.
An assessment will tell you what you’re doing well and where you’re exposed to risk. It gives you a baseline upon which to build your strategy and reminds you to align your physical, procedural, personnel, and technical security measures. Plus, you will ensure that your security posture is at a best practice based level by benchmarking with industry best practices, similar organizations, and cutting edge initiatives—all combining to safeguard your employees so they can do their best work.

2. Evaluate your Emergency Management Plan.
When was the last time you reviewed your emergency management plan (EMP)? Or practiced it? Or trained your employees on it? Your EMP should be customized to your location, align with the DHS recommended phases of emergency management—prevention/mitigation, preparedness, response, and recovery—and incorporate the titles and language of the ICS (Incident Command System). By following these directives, you and your employees will be more prepared in an emergency and able to more effectively coordinate with first responders during lockdown, evacuation, shelter-in-place, reverse evacuation, or whatever response is appropriate for the situation.

3. Enhance your training curriculum.
Without consistent efforts to educate your workforce about how to maintain and improve their safety at work, many of your employees will not know what to do in an emergency. And because training is a perishable skill, you need to implement a dynamic curriculum that encourages active participation from your employees so they can respond appropriately during all emergency events, including active assailant, fire, power outage, and weather. By empowering your employees to develop their situational awareness, they can also learn to identify concerning behaviors that could lead to workplace violence—ultimately serving as contributors to their safe workplace.

4. Update your policies and procedures.
Your policies and procedures are only effective if they are up-to-date, comprehensive, and shared with your employees on a regular basis. If they are sitting on a shelf in a binder, they might have checked a box at one time, but they are most likely outdated. Do you want the policies that protect your employees to be a secret? Or ineffective? From code of conduct, drug and alcohol, and social media use to bomb threat checklists, visitor management, identification badging, and access control, your polices and procedures exist to keep your organization running smoothly and safely—and you need to make sure they are doing their job.

5. Don’t be complacent. Strive for excellence.
Do you want to just be “good enough” when it comes to safety and security? Your employees expect more and deserve better. Your security posture is only as good as the detail and effort you put into it. No one can be satisfied with an EMP downloaded from the Internet that’s not updated with the actual emergency exits and safe rooms at your location—because your employees need to know where they are during an emergency when time is of the essence and lives depend on them knowing where to go and what to do. Update, enhance, review, benchmark, aspire, inspire, evaluate, assess. Your employees will thank you.


3 Ways to Make Your Workplace Safe

An effective, holistic security strategy ensures your workplace is safe for all employees. It controls access to unauthorized people, includes policies and procedures that establish guidelines for appropriate behavior and operations, and prioritizes safety and security in all messaging, training, and documents. So how do you know if the security presence at your organization is at a best practice based level?

Think about what you currently have in place. Do you have a security strategy that includes policies, procedures, and measures designed to protect your employees and visitors? A holistic security strategy covers all the bases by combining the strengths of an assessment, emergency management plan, and training—a security assessment identifies what you have and what you need to protect your people on a daily basis, an emergency management plan outlines how to care for your people in an emergency, and training educates your people about workplace violence, risk factors, and the proper response to different types of incidents they might face. Your objectives, budget, and timeline determine your next steps.

A Security Assessment Establishes What You Have—and What You Might Need
A safe and secure workplace reflects best practices in physical, technical, procedural, and personnel security. And they must all work together to protect your people, property, and assets. That means your access control system, cameras, duress alarms, and other technical security devices are aligned with physical security measures like doors, locks, gates, and fences—and that these security disciplines are supported by trained security professionals and policies and procedures that prioritize safety and security. A security assessment will evaluate your current security posture and offer strategic considerations for improvements to achieve a best in class security environment.

An Emergency Management Plan Safeguards Your People When the Unexpected Happens
You can then use what you learn in the assessment to determine how well your organization addresses the four phases of emergency management as supported by the Department of Homeland Security: prevention/mitigation, preparedness, response, and recovery. A clear, comprehensive, and detailed emergency management plan focuses on these four phases and their critical emergency-related priorities during all hazards including natural (weather), accidental (power outage), and criminal (active assailant). A plan tailored specifically to the circumstances of the emergency and your property helps to ensure safety for staff, visitors, clients, and contractors when the unexpected occurs. The plan also ensures coordination with local first responders.

Workplace Violence Mitigation and Active Assailant Response Training Creates an Educated Workforce
A holistic strategy is stronger when you educate and train your employees on workplace violence mitigation and the proper response in an emergency. By enhancing their situational awareness, your people can take a proactive approach to identifying concerning behaviors in the workplace to keep everyone safe. They will understand the importance of “if you see something, say something”—and what that “something” could be—and how your current policies and procedures protect them. By exploring DHS-recommended principles of emergency management along with Run. Hide. Fight., they’ll know what to do and where to go in an emergency.

A 3-Part Security Strategy Protects Your People
Each service can stand on its own with its specific goals and objectives, but their individual strengths combine to help to ensure a safe workplace during daily operations as well as in an emergency. Ideally, an assessment would first establish your overall security presence, the plan would tailor the four phases of emergency management to your specific location by identifying safe rooms, assembly areas, and relocation sites and coordinating with local first responders, and the training would help your employees recognize signs of concerning behavior and show them what to do and where to go if the emergency calls for lockdown, evacuation, or shelter-in-place.

When you learn how each service interacts and builds upon each other, that understanding leads you to more informed decision-making that determines next steps based on your budget, priorities, and timeline. While the ideal sequence is assessment, plan, and training, you may choose to manage the project differently based on your current capabilities. We’ll work with you to customize each service to maximize its effectiveness and provide options to assist your decision-making process.


Before Run, Hide, Fight: Prepare, Respond, Recover

Power in Numbers
With active threat incidents top of mind for many of us due to recent events and continuous media coverage, I contacted a select number of professionals in my network to ask for their insight on current best practices to mitigating an active threat, whether the attack came from a firearm, explosive, or vehicle.

Fortunately, my colleagues stepped up in a big way—thank you!—and I received more than 100 responses, a real testament to their dedication and professionalism. So in an effort to continually share relevant and informative content to help keep all of us safe, I have condensed, highlighted, and organized what I learned from them and now pass along their expertise. The key to mitigating an active threat comes down to three critical components: 1) Preparation, 2) Response, and 3) Recovery.

Run, Hide, Fight
Thanks to the Department of Homeland Security (DHS), the public is familiar with its safety recommendation of “Run, Hide, Fight.” Also the acronym “ALICE” (Alert, Lockdown, Inform, Counter, Evacuate) has become common language to many of our citizens. Both responses are dynamic and can save lives, which is the paramount goal of all emergency management planning. While this information is invaluable, it is not enough to craft a holistic approach. In plain language, you need to mitigate an active threat before, during, and after an incident and here’s why.

Prepare
Preparation begins with an assessment of current capabilities to determine the difference between what you have and what you need by reviewing the physical security measures, security technologies, policies and procedures, personnel numbers, emergency management documents, and incident reporting protocols to understand your level of competency. Based on this knowledge, you can make educated decisions regarding procurement as well as support to enhance areas not yet considered at a best practice level according to industry standards.

After determining the resources and skill sets internally (security, legal, emergency management, HR) and externally (police, fire, emergency medical), you can establish a training curriculum that will adequately prepare your workforce and first responders to coordinate and integrate your mitigation disciplines. Your training strategy focuses on how employee or student activities, building management, daily operations, access control, visitor management, emergency preparedness, and incident response work together to ensure safety.

Respond
Training can also teach how to integrate individual functions with multi-entity operations. You should ensure all stakeholders train to, exercise, and become familiar with response—because successful response implementation depends on the key measures necessary to mitigating casualties in the interval between the time of an attack and the point when first responders arrive on the scene. If properly identified, planned for, and practiced, the emergency medical and first aid capabilities of internal staff can also benefit your response efforts.

Response also requires a coordinated joint approach among response partners to deliver crisis information to ensure timely, accurate, accessible, and consistent communications across multiple stakeholders, to minimize confusion and dispel rumors during an incident. Messaging should take into account the challenges of your organization to ensure successful communication, including different languages spoken, hearing and visually impaired personnel, and technology used to share information. Also, you can use social media to distribute information rapidly to prevent inaccurate or misleading news.

Recover
Any emergency incident disrupts essential functions, services, and capabilities across an entire enterprise or institution. Even if the incident did not occur on your property, you can still be affected. Organizations, both government and private sector, located in and near the incident may experience disruptions of routine operations and/or loss of infrastructure or critical systems. Effective recovery planning and operations increase resiliency and ensure you can continue to provide essential functions and services after an incident.
Examples of questions you need to answer to determine your organization’s competency level for mitigating an active threat:
• Do you have memorandums of understanding (MOUs) or mutual aid agreements (MAAs) in place?
• Do your strategies align with the four phases of emergency management (prevention/mitigation, preparedness, response, and recovery?
• Do you have a property-specific emergency management plan in full compliance with the National Incident Management System (NIMS) and the Incident Command System (ICS)?

We’re Here to Help
Protecting human life is the paramount goal of any active threat incident. We can work with you to construct a tailored active threat plan that addresses specific areas of concern, like an active shooter or bomb threat, and provides you with a planned response and recovery to protect against all hazards, such as accidental (chemical spill), intentional (armed assailant), or natural (weather). Emergency preparedness is a 24/7 mission and we’ll partner with you to ensure protecting your people is always your top priority.


Uncover the Secret to a Comprehensive and Dynamic Investigation

Maybe you know your employee is stealing from you but you don’t have the personnel in place to resolve it properly. Or maybe your company is expanding quickly, you need to add several executives to your team, and you can’t afford to hire the wrong person. Or what if an employee has been threatened by a former spouse and you want to protect your people and organization from a possible workplace violence incident. You need to investigate but how do you begin?

Let’s face it—practically any private detective or security consultant can conduct an investigation. What separates a rudimentary and traditional investigation from an innovative and cutting edge methodology is understanding and implementing all the resources and tools available in the security and investigations industry. And by combining a consultant’s experience, background, qualifications, and institutional knowledge with that methodology, you’ll uncover the secret to a comprehensive and dynamic investigation— that will keep you safe, secure, and compliant.

Power in Numbers

An investigation done correctly and thoroughly is a collaboration between different skill sets and disciplines that results in the implementation of the very best fact-finding processes, possibly ending in prosecution, but always restoring peace of mind. When law enforcement and security professionals leverage their combined talents and respective expertise, they acquire information that most private investigations cannot locate. A highly skilled investigator can get results that others can’t through knowledge, experience, and contacts that are not accessible through online searches. And those particular skills and access benefit you and your organization to keep your company, people, assets, and reputation safe.

You might need assistance with investigations such as:

  • Asset search and recovery
  • Background investigation
  • Background research
  • Court testimony
  • Due diligence investigation
  • Expert witness report
  • Financial investigation
  • Fraud investigation
  • Internal investigation
  • Legal deposition
  • Legal support
  • Threat assessment

By outlining the scope and specific objectives of the investigation, you’ll help tailor the engagement to fit your particular circumstances, culture, and business.

Pathway to Violence

When I was an agent in the Secret Service, we developed a three-step process for threat investigations, especially threats against the President, which The Lake Forest Group still uses today.

  1. We identify the threat by determining the person responsible and reason behind his or her actions.
  2. We assess the circumstances. What caused this situation? Does the subject have the means and the motivation for violence? Does the subject have a history of violence or access to weapons? Is he or she dealing with a financial or personal loss, marital issues, drug dependency, alcoholism, or some other issue?
  3. Working with you and mental health professionals, we collectively determine the most effective way to manage the person, which might include incarceration, institutionalization, counseling, or monitoring.

Most importantly, the person is continuously managed so that over time he or she can be rehabilitated and no longer present a threat.

Discretion Is the Better Part of Valor 

If your organization conducts business overseas, investigations of foreign entities may require knowledge of local laws, languages, or customs, which can be particularly helpful to a corporate compliance department and general counsel for an investigation related to a merger or acquisition. In many countries and situations, information is not available and accessible online or through a computerized database so your private investigator’s contacts in foreign countries can assist your investigation by retrieving information through an on-site visit to a courthouse or records building.

We’ll Help You Get It Done Right

We can design an investigation strategy that’s right for your culture and, most importantly, protects your most valuable assets—your people. Our experiences in the private sector provide you with an independent voice, benchmark best practices in investigations, and share the necessary insight and hands-on advice to ensure a successful investigation—that lead to the proper course of action and tangible results. Our global network of law enforcement and security professionals further supports you by allowing us to conduct investigations both here in the United States and internationally and utilizing expertise and resources that are not available to most private sector organizations.


Your Background Investigations Need to Do More Than Check and Screen

After conducting numerous engagements in both the private and public sectors, I repeatedly find that the top concern of my clients is protecting the personal safety of their people and the integrity and legacy of their brand. And as one way to safeguard your company, assets, reputation, and, most importantly, your people, a dynamic background investigation strategy in the hiring process offers a holistic security vision designed to protect against unnecessary vulnerabilities and built upon industry best practices.

When you make the decision to bring someone into the workplace, you need to know that you’ve taken advantage of the necessary resources and appropriate subject matter expertise to fully investigate that individual’s background—so that the people who work for you are the right people to represent you and your organization. You can mitigate exposure of your employees and visitors to potential workplace violence by exercising diligence through a thorough examination into someone’s professional and personal history.

Background Investigation Strategy

As the foundation for your strategy, you want to maximize the most comprehensive and effective combination of background, due diligence, and investigative disciplines available that go beyond cursory background checks. We base our recommended background investigation methodology on best practices, previous experiences, and ongoing research to stay up-to-date on emerging trends and innovative measures in the industry—so we can help you ensure that your background investigation strategy complements the overall security strategy you have in place to protect your people, property, and investment.

Building a Solid Framework

Because background investigations require systematic processes that can effectively and efficiently screen candidates for management and/or sensitive positions, companies must focus on the processes needed to coordinate these activities. You’ll want to tailor your background investigation program to best meet your security, safety, and risk mitigation needs and, at the same time, fit your culture.

This begins by building a framework that engages three crucial steps to collectively establish a background investigation strategy:

  • Defining the scope and nature of the elements to be investigated, which will include the verification and investigative due diligence processes applicable to standard and enhanced background screening categories.
  • Establishing a decision-making matrix that can be applied across your organization in a consistent manner.
  • Relying on a collaborative effort to identify and define the final components of your program. In other words, you need to determine what categories will be investigated such as criminal, civil, work history, education, references, Internet, social media, and drug testing.

Leave No Stone Unturned

An enhanced background investigation can be performed on executive level employees or applicants and employees being considered for hire or promotion in certain positions involving (1) access to confidential, sensitive, or proprietary information, such as financial, tax, or personnel information; (2) cash management, accounting, or inventory control functions; or (3) a high degree of trust and confidentiality. You can also consider other investigative tools such as personal interviews with the applicant’s professional and personal acquaintances, private investigations, drug and health testing, and psychological assessments.

A comprehensive background investigation includes a spectrum of criminal, civil, and due diligence inquiries. In addition to the areas covered in a standard background screening, an enhanced background screening includes, but is not limited to:

  • Asset Search, Bankruptcy
  • Liens and Judgments
  • Employment Credit Report
  • Federal National Civil Search
  • Media Search
  • Military Service Verification
  • Professional References
  • Social Media Query
  • Internet Open Source Material

Not a “One Size Fits All” Proposition

Every organization presents its own unique environment, along with specific needs and concerns. A background investigation for a financial services client will be different than a higher education institution. Because there is no standardized template for a tailored background investigation, you will need to adjust the scope of these services based on factors such as your geographic location, workplace violence incidents, labor unrest, and company expansion. For a background investigation to be comprehensive, it needs to understand both the needs of the client and the organization’s culture.

We can design a background investigation strategy that’s right for your culture and, most importantly, protects your most valuable assets—people. Our experiences in the private sector offer an independent voice, benchmark best practices in background investigations, and share the necessary insight and hands-on advice that lead to tangible results to ensure a comprehensive background investigation course of action.


Protecting Houses of Worship, Providing Security for Sanctuaries

No matter where you live in the world, a house of worship, whether a temple, church, synagogue, or mosque, should provide an escape from the evils of mankind. These sanctuaries offer us a place of peace where people from different social, economic, political, and ethnic backgrounds can come together to unite in their common faith.

Recently, even these sacred grounds have come under attack and been the scene of yet more tragic events in our country. When a tragedy occurs at a movie theater, school, concert, and now church, we learn that no place is immune to violence and we need to be acutely aware of our environment at all times. By learning from these past incidents, let’s consider what we can do to protect houses of worship and provide security for our sanctuaries.

Keep the Faith

On the day of a service, both employees and visitors of a place of worship can have a role to play to enhance protection. The congregation can be taught how to develop their situational awareness and identify possible threats and early warning signs of potential violence, such as surveillance, erratic behavior, signs of domestic violence, and indications of mental health issues, before they manifest into a much more serious risk. Houses of worship can also regularly distribute safety and security material to make people aware of relevant threats or issues of concern.

While ushers at most places of worship show people to their seats, they can provide information for a number of different inquiries. These people can also be the ears and eyes for a covert security platform. As people enter the building and once the service starts, they can visually observe the interior and exterior of the property to look for anomalies or suspicious activity.

Pray, Plan, Prepare, and Protect

Prayer is always good but it’s also important to plan, prepare, and protect against potential emergencies. The Department of Homeland Security’s “If You See Something, Say Something” campaign applies here. In order to mitigate an incident, we must first identify an event as a possible emergency (seeing) and then make the proper notification (saying). An emergency management plan is especially important for a number of reasons. If you have a plan, your people will know what to do when it comes to a potential incident, such as the arrival of a suspicious package or unauthorized intruder. When your employees and visitors understand their roles in an emergency, they can help to ensure safety—which is only possible with the proper preparation, planning, and training to respond to a crisis.

All Hazards but One Goal—Keep Your People Safe

You can capture the necessary procedures to keep your people safe in an all hazards emergency plan, because an all hazards approach prepares for every kind of incident—especially since most emergency plans rarely cover everything that might be required. Adaptable to circumstances, innovative, and, when necessary, improvisational, an all-hazards plan provides a definitive framework for responding to a wide variety of emergencies and includes designated lockdown procedures, safe rooms, emergency exits, and relocation areas.


Stopping an Active Shooter Is More Than Run, Hide, Fight

Unfortunately, our country continues to be plagued by horrific active shooter incidents such as what occurred at the Ft. Lauderdale Airport last week as we remember those who lost their lives or were injured in the attack. Because of the constant reoccurrence of these tragedies, the Department of Homeland Security created the action phrase  ̶ ̶  Run, Hide, Fight. These instructions have become almost instinctive and such a key part of our culture that under extreme duress, such as an active shooter incident, ordinary citizens know how to react appropriately. And this knowledge of what to do will hopefully save their lives and possibly the lives of others.

Although I acknowledge the importance of Run, Hide, Fight, I also understand how much more needs to be considered in order to protect ourselves against an active shooter. Run, Hide, Fight instructs us primarily on what to do during an incident, but what also needs to be taught is how to prevent the incident from occurring in the first place. The year 2017 offers us an opportunity to pause, reassess, and look at two critical elements associated with active shooters—cause and mitigation.

Starting at the Beginning Is a Good Place to Start

After an active shooter incident occurs, the post-incident investigation traces the history of the shooter to determine possible association to the victims and the scene of the crime and often reveals a number of clues that show the active shooter was on a pathway to violence. Some of these warning signs include inappropriate posts or disturbing videos on social media, violent outbursts, threatening comments, and dramatic changes in appearance.

Because each of these incidents needs to stand on its own, we don’t have a universally accepted profile to identify a potential active shooter—so having the preventative strategies in place before an incident offers one key measure to mitigating it. If you know what indicators to look for and have access to professional assistance, such as mental health services, you may be able to determine if intervention is necessary. Any of these signs could be an indication of a much more serious problem that may require identification, assessment, and management of a potential violent situation by a team of professionals with a diverse skill set.

Failing to Plan Is Planning to Fail  

So far, I’ve talked about what to do during an active shooter scenario (run, hide, fight) and the actions to take to prevent irregular behavior (identify, assess, manage) from deteriorating into an act of violence. A holistic strategy will feature all of these recommendations along with a number of other preventative disciplines in order to deter, delay, or deny the possible occurrence of an active shooter incident.

You can help to efficiently and effectively ensure safety and security with the proper planning, awareness, education and training necessary to respond to an active shooter. And the best way to implement these measures is to capture the essential processes in an Active Shooter Plan. The plan needs to be adaptable to circumstances, innovative, and, when necessary, improvisational and ideally prepares everyone for all hazards—natural, accidental, and intentional.

One Is the Loneliest Number  

A site-specific Active Shooter Plan, such as for a commercial property or higher education campus, is not created by one person, or even a small group of people. In other words, your plan isn’t written in a vacuum. A multi-disciplinary approach is required and demands collaboration between internal and external stakeholders that are invested in the process. Individuals with diverse backgrounds, skill sets, and experience can come together and work side-by-side to design a plan to mitigate this threat. In-house staff can include security, legal, HR, facilities, maintenance, and emergency management while outside constituents are typically contract security, law enforcement, fire department, medical, and local emergency managers.


Welcome To Safe University (SAFE U)!

YOUR PARTNER IN CAMPUS SECURITY

Safe UniversityWhen the safety of your people is one of your top priorities and your college’s reputation is one of your most valuable assets, you’ll do whatever it takes to provide a safe environment for your students, staff, and visitors. High profile incidents such as mass shootings and sexual attacks at several universities have put the topic of campus crime in the public eye today more than ever before.

Conscientious and well-informed university personnel know that adequate staffing, multi-disciplinary involvement, sufficient resources, appropriate policies, and external support make these incidents less likely to occur—and make leaders more prepared if they do. Safe University (Safe U) partners with you to supplement and enhance your existing security programs by tailoring best practices to your unique situation and campus culture

HOW SAFE U BENEFITS YOUR SCHOOL AND YOUR PEOPLE
Safe U partners with you to create a safe campus environment by ensuring current policies, procedures, personnel, physical measures, technology, and training are at an industry best practice level. Through coordination and integration for preventative security, emergency preparedness, and incident response, Safe U identifies the steps necessary to ensure that students, faculty, visitors, family members, guests, and friends are not exposed to harm.
Our Safe U program specifically tailors best practices in these areas to your unique environment:
• Processes: policies, procedures, plans, and programs
• Personnel: management, police, public safety, and security
• Technology: cameras, access control, alarms, notifications, and call/assistance station boxes
• Emergency preparedness: weather, fire, power, and intruder
• Education awareness and training: classes, exercises, and web-based
• Event planning and management: school-sponsored functions
• Background screening and drug testing: scope, pre- and post-employment
• Physical security: fences, gates, barriers, lighting, and locks
• Regulatory compliance: Title IX, Violence Against Women Act, and Clery Act
PROTECT YOUR PEOPLE, CAMPUS AND BRAND BY BENCHMARKING WITH THE BEST

Studies show that although 86% of higher educational schools have an emergency operations plan, more than 1 in 4 have not had a hazard and vulnerability assessment to develop appropriate all-hazard emergency planning. We’ll share with you knowledge gained from safeguarding global corporations, high profile individuals, major events, and campuses around the country to protect what’s most important.

ADD ANOTHER LAYER OF SAFETY THROUGH SAFE U’S OBJECTIVE REVIEW

By providing objectivity through an independent analysis of your current resources, Safe U ensures a holistic security strategy by sharing the extensive expertise of our team. G. Michael Verden, CEO and Owner of The Lake Forest Group, is a global security expert with a distinguished 21-year career with the United States Secret Service. As a Special Agent, he served on the Presidential Protective Division, Dignitary Protective Division, and Counter Assault Team and assisted in the security and protection of facilities and people for major events, including the Olympics, Super Bowl, Kentucky Derby, Indianapolis 500, and the Women’s Soccer World Cup, among others. As Director of Security for the NBA, he supervised security for the NBA All-Star Game, NBA Finals, and World Basketball Championships. Mike will personally guide the Safe U program to assess and evaluate your current security needs and provide options to optimize your strategic security plan and emergency management plan.


The Impact of Domestic Violence in the Workplace

This blog is by guest writer, Mr. John Savas, who has more than 25 years of human resource experience in both corporate and consulting roles, and has worked with a variety of industries in public and private companies, family-owned businesses, and non-profit organizations.

Workplace Violence and Domestic Violence are Related

People often wonder why we talk about domestic violence in the same breath as workplace violence. After all, one happens at home and the other is usually some ticked off former employee who goes back to the office to wreak havoc, right? While the former employee scenario is just one of many types of workplace violence, other perpetrators of workplace violence include disgruntled employees, criminal outsiders, and those who have a personal relationship with the victim. This last one is normally characterized as domestic violence that spills over into the workplace with women at a higher risk of being victims of this type of violence.

The Numbers Do Not Lie  

Statistics tell us that one in four women is likely to be a victim of domestic violence in her lifetime. Consider the enormity of that statistic and then think about your own workplace. That means that virtually every business has women who have been, currently are, or will be victimized by a partner. In 2014, 7% of workplace homicides were a direct result of a personal relationship. It is so important for companies like yours to step up efforts as they relate to domestic violence. Aside from it being the right thing to do to protect your employees and provide them a safe and supportive environment in which to work, businesses are incurring significant costs as a direct result of domestic violence, above and beyond the effects of the actual violence that occurs at work.

Understanding the Health Issues of Workplace Violence

The cost of domestic violence for your business usually falls into one of two categories: health benefit costs and lost productivity. Let’s spend a moment talking about health benefit costs. Did you know that one in three women seen in an emergency room is there as a direct result of domestic violence? Health care costs for women of domestic violence are in excess of $2,000 more each year than those of other similarly situated women. And that estimate is based on the most extreme cases of physical and sexual assault. Less extreme examples such as mental, emotional, and verbal abuse also result in medical plan usage, but statistics are not readily available for these issues.

Lost Productivity from Absence and Abuse  

As for lost productivity, some conservative estimates put absenteeism for victims just over eight days per year, but once again, this only accounts for the most extreme cases of physical and sexual assault. And what about non-absentee lost productivity? Victims of domestic violence are distracted at work due to physical, mental, and emotional abuse.

Domestic Violence Mitigation in the Workplace     

Effective workplace violence policies can make a difference in the lives of the women who work in your organization in addition to creating a supportive workplace culture. Do your policies encourage open communication between employees and your organization? Do your employees feel that they can confide in you if they are experiencing threatening behavior at home without fear of retribution in the form of disciplinary action, lost wages, or possible termination?

When it’s all said and done, the costs to the company for domestic violence can be significant, whether it spills into the workplace or not. When was the last time you thoroughly reviewed your policies, outreach and support programs, and how you handle domestic violence in the workplace? We’re here to help.

Mr. John Savas has been exposed to virtually all areas within HR throughout his career and has been instrumental in the development and implementation of numerous workplace violence prevention and intervention programs, including domestic violence in the workplace. John speaks and trains frequently on topics such as performance management, leadership, harassment and discrimination, and workplace violence.