Share |
 

Co-Located With:

 CPM_East 

Joint Expo & Networking!

Connect: FacebookLinkedinTwitter

Campus Security and Life Safety (SLS)

SLS2-2 The Use of Digital Mapping for Critical Decision Making

November 20, 2013

2:15 PM - 3:15 PM

Ron Martin, CPP

Open Security Exchange

Tom McDonald

BeSafe Technologies, Inc.

Dawn Schafer

HAWK (Helping America Watch over its Kids)

Michael Wylie, CPP PCI

Cincinnati State Technical & Community College

Identity fraud and Fraudulent Credentials create a challenge to every organization relying on the acceptance of known ID as Authentic. Much has been said about the difficulties in screening persons for possible imposter fraud or security concerns based upon use of current identity documents like birth certificates, driver licenses or passports. The most often reasons given are the lack of standardization of security features and the layout for these documents.  

In addition, the Clery Act is a federal statute and requires the mapping of facilities. The use of Interactive Mapping enables administrators to efficiently distribute accurate, up-to-date building information to all first responders that is essential to protecting school personnel and students. This technique integrates Video, Sensors and security system devices with Computer Aided Design blueprints.

In this session, we will discuss how interactive mapping is used during a crisis, enabling multiple levels of government to provide coordinated responses to emergencies on campus facilities that are spread out over multiple locations. We will discuss how using this modeling technique will enable all first responders to have the same consistent information to effectively communicate and how these two concepts, Authentication and Interactive Mapping, blended together provide a holistic view of school security.

Learning Objectives:

  1. Understand sound techniques for breeder document authentication
  2. Utilizing an on-demand detailed mapping of buildings with instant access to a facility's floor plan, digital photos and real-time access to video surveillance cameras.
  3. How first responders can access and share critical information before they arrive onsite