SlideShare una empresa de Scribd logo
1 de 32
How to Respond to a Security Incident
at Your Library
Dr. Steve Albrecht, PHR, CPP, BCC
San Diego, CA
619-990-2685
drsteve@drstevealbrecht.com
Your
Personal
Safety
Consistent policies
and approaches to
challenging people.
Customer
Service Skills
Some Themes . . .
Profiles or behaviors?
Peace or justice?
What should asking for help mean?
Chain of command or not?
How do we align with patrons?
If there are no consequences . . .
Acting skills . . .
Do your job or do your job safely?
If it’s measured, it can be managed.
Code of Conduct
In my perfect world, your facility would post the Code of
Conduct in many visible locations, in poster-sized
versions.
Putting the Code of Conduct on a clipboard behind the
Circulation Desk or only on your web site, is not enough.
In my perfect world, the Code of Conduct language would
be written positively, and in plain English, not legalese.
Tough Situations
Entitled, angry, threatening, or eccentric patrons.
Unruly children and teenagers (and animals).
Stalking behaviors by patrons.
Domestic violence comes to the library.
No security and missing police.
Door dashers, gate crashers, and thieves.
The homeless and the mentally ill.
Criminals, substance abusers, gang members.
Internet hogs and Internet creeps.
Stinkers, talkers, smokers, bathers, eaters, and sleepers.
The Need for Rules of Conduct:
Business Impact
Smoking (E-cigarettes?).
Soliciting for money.
Interfering with the safe use of the library.
Misusing the Internet.
Bikes or skateboards.
Theft or vandalism.
Misuse of restrooms.
Shirts and shoes.
The Need For Rules of Conduct:
Business Impact
Unattended children.
Service animals versus “comfort” animals.
Sleeping.
Food and drink.
Electronic devices – use or noise.
Hygiene.
Unattended belongings.
Blocking aisles and exits.
Law Enforcement Support
In my perfect world, a police officer or sheriff’s deputy would visit
your facility nearly every day, at different times.
Have staff put the Dispatch numbers into their cell phones.
Have your Director(s) call the Watch Commander and ask for
regular or extra patrols.
Create a hangout environment for the officers or deputies.
Write incident reports with victim, suspect, witness information.
Introduce / Ask / Explain
Introduce yourself. Try to get the person’s name.
Explain:
“I noticed that . . . “
“The reason I’m here is . . .”
“I’m sure you already know this, but . . .”
Ask: “I need to ask you to . . .”“I need to ask you to . . .”
Typical Security-Related Incidents
Angry, challenging, threatening, or eccentric patrons.
Unruly younger kids, difficult teenagers, with or without
their parents.
Patrons with personal or sexual boundary problems with
patrons or staff.
Domestic violence involving patrons or staff.
Typical Security-Related Incidents
Chronically homeless.
Mentally ill people.
Gang members.
Substance abusers.
Internet misusers.
Rule violators.
Typical Security-Related Incidents
Angry, challenging, threatening, or eccentric patrons.
Entitled, difficult, not always willing to listen or comply.
Use venting and validation.
Consider the best service “alignment.”
Use space and distance – arm’s length plus.
Use proxemic barriers if your safety is at risk.
Change the ratios of confrontation: get help.
“I can’t help you if you yell at me or threaten me.”
Call the police or use code words to alert a colleague.
Typical Security-Related Incidents
Unruly younger kids, difficult teenagers, with or without
their parents.
Not always great at following The Rules.
“You can’t do that if you want to stay here.”
Separate groups of teenagers; talk to one.
Tactful conversations with the parent(s).
Age / race / gender alignment with staff?
Peer pressure and hyper-embarrassment issues?
Firm, fair, consistent; enforce consequences daily.
Patience versus “business impact.”
Typical Security-Related Incidents
Patrons with personal or sexual boundary problems with
patrons or staff.
Inappropriate conversations, flirting, unwanted attention.
Using the Internet to cyberstalk or stalk patrons or staff.
Patrons who make physical or sexual contact with staff or
patrons. Illegal sexual behavior is a sign of escalation.
Pedophiles: Trust your intuition and call the police.
Typical Security-Related Incidents
Domestic violence involving patrons or staff.
Victims or perpetrators who come to the library.
Staff members with domestic violence issues that
crossover from home to work.
Child custody issues? The library as neutral territory?
EAP referrals? Creative HR responses? Location
change?
DV advocates, social services, police intervention.
Typical Security-Related Incidents
Chronically homeless.
People with “poly-problems”: mental illness, substance
abuse, poor social skills.
People who bring their pets, worldly goods, bags (and bags
and bags), children, and friends.
Use space and distance and humane treatment. Set early
boundaries. Meet with the group leaders. Ask for their help.
Meet regularly with homeless advocacy groups and
agencies. Don’t take “We can’t do much” for an answer.
Typical Security-Related Incidents
Mentally ill people.
Undiagnosed, under-treated, under-medicated, wrongly-
medicated, self-medicated.
Fearful, angry, confused, aggressive, delusional, psychotic.
Know the three-type criteria and get help from social
services and police.
Consider restraining orders for the chronically problematic.
Typical Security-Related Incidents
Gang members.
Not just kids who sag their pants or wear hats sideways,
but gangsters, who belong to a criminal organization.
High degree of hypersensitivity to being slighted, especially
in front of their pals and their girls.
Remove tagged material and get graffiti repaired. Watch
for vandalism, drug sales, intimidation, recruiting.
Call police and local groups related to gang suppression.
Typical Security-Related Incidents
Substance abusers.
Some people can handle their goodies; some cannot. It is
illegal to be high on drugs or alcohol and not in control.
Alcohol users and drug users are erratic. Opiate and
cannabis drug users tend to be more mellow (tiny pupils).
Stimulant drug users are highly-problematic (huge pupils).
Ask them to leave. Use space and distance.
Call the police.
Typical Security-Related Incidents
Internet misusers.
Hogs or oddballs? Time-wasting or porn? Business
impact?
Remind them of your policies each time, including personal
device use policies.
Use the power of filters, time limiters, separation, and
careful peer pressure.
Typical Security-Related Incidents
Rule violators: entitled, ignorers, thieves, kid-leavers.
“I pay your salary. I want to speak to your supervisor. I’ve
been coming here since before you were born. I know the
Mayor. You can’t tell me what to do.”
Oblivious or intentionally disregards rules and policies.
Watch for theft and shoplift behaviors. Check eBay,
Craigslist, and other sites for stolen materials. Make police
reports and ask for investigative follow-ups.
Recognize abandoned kids and be a mandated reporter.
Typical Emergency Situations
Medical or first-aid situations.
Fires.
Earthquakes.
Gas leaks or chemical spills.
Tornadoes, weather incidents.
Flooding – plumbing or natural.
Typical Emergency Situations
Medical or first-aid situations.
Major events: A B C – Airway – Breathing – Circulation
Heart attacks, strokes, choking, serious cuts, compound
breaks from falls.
Update all first-aid kits, CPR classes, AED classes.
Don’t assume people know or someone has called 911.
Document all incidents and near-misses.
Typical Emergency Situations
Fires.
Update your floor warden procedures.
Monitor for early-warning signs: wiring, chemicals, brush
fires in the city.
Pull the alarms and yell for help and to get staff and patron
attention.
Evacuate all staff and patrons through the best exits.
Typical Emergency Situations
Earthquakes.
Schedule a yearly drill.
Make an evacuation decision.
Have the building checked for damage before re-entering.
Typical Emergency Situations
Gas leaks or chemical spills.
Follow your nose.
Evacuate and call 911.
Follow instructions.
Assess for medical issues or claims.
Typical Emergency Situations
Tornadoes, weather incidents.
Follow the weather updates carefully.
Know and follow your shelter-in-place and evacuation
procedures.
Make good decisions as to whether to close the facility.
Typical Emergency Situations
Flooding – plumbing or natural.
Old pipes + system stress = big problems
Pay attention to early-warning signs.
Monitor the weather.
Follow first-responder advice.
Top Ten Tips
1. Trust your intuition.
2. Be “assertively polite.”
3. Try a lighter touch first.
4. Know when to change the ratios of confrontation.
5. Stay in Condition Yellow around the public.
Top Ten Tips
6. Change your position; use space,
distance, and proxemic barriers.
7. Practice “If-Then” thinking.
8. Report every incident where you or
others felt afraid.
9. Work as a team.
10. Be a shepherd.

Más contenido relacionado

Destacado

Winning Library Grant Sources and Resources
Winning Library Grant Sources and ResourcesWinning Library Grant Sources and Resources
Winning Library Grant Sources and ResourcesALATechSource
 
Library Analytics with Char Booth and Paul Signorelli, Session 1 Part 1
Library Analytics with Char Booth and Paul Signorelli, Session 1 Part 1Library Analytics with Char Booth and Paul Signorelli, Session 1 Part 1
Library Analytics with Char Booth and Paul Signorelli, Session 1 Part 1ALATechSource
 
Alessio Workshop: 'Tis the Season to be Reading - Handout 6
Alessio Workshop: 'Tis the Season to be Reading - Handout 6Alessio Workshop: 'Tis the Season to be Reading - Handout 6
Alessio Workshop: 'Tis the Season to be Reading - Handout 6ALATechSource
 
Hakala-Ausperk, How to build a Great Team: Part Two
Hakala-Ausperk, How to build a Great Team: Part Two Hakala-Ausperk, How to build a Great Team: Part Two
Hakala-Ausperk, How to build a Great Team: Part Two ALATechSource
 
Using Technology in Library Management Session 1
Using Technology in Library Management Session 1Using Technology in Library Management Session 1
Using Technology in Library Management Session 1ALATechSource
 
Gathering and Using Community Data: Making the Best Decisions for Your Library
Gathering and Using Community Data: Making the Best Decisions for Your LibraryGathering and Using Community Data: Making the Best Decisions for Your Library
Gathering and Using Community Data: Making the Best Decisions for Your LibraryALATechSource
 
Tom Peters' Slides from the ALA TechSource 2011 Midwinter Tech Wrapup
Tom Peters' Slides from the ALA TechSource 2011 Midwinter Tech WrapupTom Peters' Slides from the ALA TechSource 2011 Midwinter Tech Wrapup
Tom Peters' Slides from the ALA TechSource 2011 Midwinter Tech WrapupALATechSource
 
Directions In Metadata--Main Presentation
Directions In Metadata--Main PresentationDirections In Metadata--Main Presentation
Directions In Metadata--Main PresentationALATechSource
 
King: Building the Digital Branch Handout 3
King: Building the Digital Branch Handout 3King: Building the Digital Branch Handout 3
King: Building the Digital Branch Handout 3ALATechSource
 
Wittig: Creating a Digital Media Space for Today's Teens, Part 1 and Part 2
Wittig: Creating a Digital Media Space for Today's Teens, Part 1 and Part 2 Wittig: Creating a Digital Media Space for Today's Teens, Part 1 and Part 2
Wittig: Creating a Digital Media Space for Today's Teens, Part 1 and Part 2 ALATechSource
 
Alessio Workshop: Novel Treats - Handout 3
Alessio Workshop: Novel Treats - Handout 3Alessio Workshop: Novel Treats - Handout 3
Alessio Workshop: Novel Treats - Handout 3ALATechSource
 
Serving Children with Autism Spectrum Disorder (Part 1)
Serving Children with Autism Spectrum Disorder (Part 1)Serving Children with Autism Spectrum Disorder (Part 1)
Serving Children with Autism Spectrum Disorder (Part 1)ALATechSource
 
Jacobson and Mackey: Metaliteracy Workshop
Jacobson and Mackey: Metaliteracy Workshop Jacobson and Mackey: Metaliteracy Workshop
Jacobson and Mackey: Metaliteracy Workshop ALATechSource
 
Steiner—How to Improve Your Library Instruction: Assessment in Five Minutes
Steiner—How to Improve Your Library Instruction: Assessment in Five MinutesSteiner—How to Improve Your Library Instruction: Assessment in Five Minutes
Steiner—How to Improve Your Library Instruction: Assessment in Five MinutesALATechSource
 

Destacado (16)

Winning Library Grant Sources and Resources
Winning Library Grant Sources and ResourcesWinning Library Grant Sources and Resources
Winning Library Grant Sources and Resources
 
Library Analytics with Char Booth and Paul Signorelli, Session 1 Part 1
Library Analytics with Char Booth and Paul Signorelli, Session 1 Part 1Library Analytics with Char Booth and Paul Signorelli, Session 1 Part 1
Library Analytics with Char Booth and Paul Signorelli, Session 1 Part 1
 
Alessio Workshop: 'Tis the Season to be Reading - Handout 6
Alessio Workshop: 'Tis the Season to be Reading - Handout 6Alessio Workshop: 'Tis the Season to be Reading - Handout 6
Alessio Workshop: 'Tis the Season to be Reading - Handout 6
 
Hakala-Ausperk, How to build a Great Team: Part Two
Hakala-Ausperk, How to build a Great Team: Part Two Hakala-Ausperk, How to build a Great Team: Part Two
Hakala-Ausperk, How to build a Great Team: Part Two
 
Hakala intro part1
Hakala intro part1Hakala intro part1
Hakala intro part1
 
Week 2
Week 2Week 2
Week 2
 
Using Technology in Library Management Session 1
Using Technology in Library Management Session 1Using Technology in Library Management Session 1
Using Technology in Library Management Session 1
 
Gathering and Using Community Data: Making the Best Decisions for Your Library
Gathering and Using Community Data: Making the Best Decisions for Your LibraryGathering and Using Community Data: Making the Best Decisions for Your Library
Gathering and Using Community Data: Making the Best Decisions for Your Library
 
Tom Peters' Slides from the ALA TechSource 2011 Midwinter Tech Wrapup
Tom Peters' Slides from the ALA TechSource 2011 Midwinter Tech WrapupTom Peters' Slides from the ALA TechSource 2011 Midwinter Tech Wrapup
Tom Peters' Slides from the ALA TechSource 2011 Midwinter Tech Wrapup
 
Directions In Metadata--Main Presentation
Directions In Metadata--Main PresentationDirections In Metadata--Main Presentation
Directions In Metadata--Main Presentation
 
King: Building the Digital Branch Handout 3
King: Building the Digital Branch Handout 3King: Building the Digital Branch Handout 3
King: Building the Digital Branch Handout 3
 
Wittig: Creating a Digital Media Space for Today's Teens, Part 1 and Part 2
Wittig: Creating a Digital Media Space for Today's Teens, Part 1 and Part 2 Wittig: Creating a Digital Media Space for Today's Teens, Part 1 and Part 2
Wittig: Creating a Digital Media Space for Today's Teens, Part 1 and Part 2
 
Alessio Workshop: Novel Treats - Handout 3
Alessio Workshop: Novel Treats - Handout 3Alessio Workshop: Novel Treats - Handout 3
Alessio Workshop: Novel Treats - Handout 3
 
Serving Children with Autism Spectrum Disorder (Part 1)
Serving Children with Autism Spectrum Disorder (Part 1)Serving Children with Autism Spectrum Disorder (Part 1)
Serving Children with Autism Spectrum Disorder (Part 1)
 
Jacobson and Mackey: Metaliteracy Workshop
Jacobson and Mackey: Metaliteracy Workshop Jacobson and Mackey: Metaliteracy Workshop
Jacobson and Mackey: Metaliteracy Workshop
 
Steiner—How to Improve Your Library Instruction: Assessment in Five Minutes
Steiner—How to Improve Your Library Instruction: Assessment in Five MinutesSteiner—How to Improve Your Library Instruction: Assessment in Five Minutes
Steiner—How to Improve Your Library Instruction: Assessment in Five Minutes
 

Similar a Albrect: How to Respond to a Security Incident Workshop

How to Respond to a Security Incident in Your Library: August 2017
How to Respond to a Security Incident in Your Library: August 2017How to Respond to a Security Incident in Your Library: August 2017
How to Respond to a Security Incident in Your Library: August 2017ALATechSource
 
Dealing with Challenging Patrons: April 2017
Dealing with Challenging Patrons: April 2017Dealing with Challenging Patrons: April 2017
Dealing with Challenging Patrons: April 2017ALATechSource
 
How to Respond to a Security Incident in Your Library (May 2020)
How to Respond to a Security Incident in Your Library (May 2020)How to Respond to a Security Incident in Your Library (May 2020)
How to Respond to a Security Incident in Your Library (May 2020)ALAeLearningSolutions
 
How to Respond to a Security Incident in Your Library - Jan. 2017
How to Respond to a Security Incident in Your Library - Jan. 2017How to Respond to a Security Incident in Your Library - Jan. 2017
How to Respond to a Security Incident in Your Library - Jan. 2017ALATechSource
 
Senior citizen safety tips
Senior citizen safety tipsSenior citizen safety tips
Senior citizen safety tipsCity of Griffin
 
SecurAlert May 2014 - Domestic Violence at Work
SecurAlert May 2014 - Domestic Violence at WorkSecurAlert May 2014 - Domestic Violence at Work
SecurAlert May 2014 - Domestic Violence at WorkChris Carney
 
Active Shooter Training for Library Employees
Active Shooter Training for Library EmployeesActive Shooter Training for Library Employees
Active Shooter Training for Library EmployeesALAeLearningSolutions
 
Dealing with Challenging Patrons (June 2019)
Dealing with Challenging Patrons (June 2019)Dealing with Challenging Patrons (June 2019)
Dealing with Challenging Patrons (June 2019)ALAeLearningSolutions
 
Model appropriate behavior (2)
Model appropriate behavior (2)Model appropriate behavior (2)
Model appropriate behavior (2)D. Scott Miller
 
CSE Presentation
CSE PresentationCSE Presentation
CSE PresentationJoe Dowds
 
How to Keep your Senior Parents Safe
How to Keep your Senior Parents SafeHow to Keep your Senior Parents Safe
How to Keep your Senior Parents SafeThe Relaxed Male
 
Child protection issues
Child protection issuesChild protection issues
Child protection issuessk2461
 
Mandatory reporting 2020
Mandatory reporting 2020Mandatory reporting 2020
Mandatory reporting 2020VicHaight
 
Child abuse
Child abuseChild abuse
Child abuseforcampc
 
Debbault Seminar
Debbault SeminarDebbault Seminar
Debbault Seminarxuxazuza
 

Similar a Albrect: How to Respond to a Security Incident Workshop (20)

How to Respond to a Security Incident in Your Library: August 2017
How to Respond to a Security Incident in Your Library: August 2017How to Respond to a Security Incident in Your Library: August 2017
How to Respond to a Security Incident in Your Library: August 2017
 
Dealing with Challenging Patrons: April 2017
Dealing with Challenging Patrons: April 2017Dealing with Challenging Patrons: April 2017
Dealing with Challenging Patrons: April 2017
 
How to Respond to a Security Incident in Your Library (May 2020)
How to Respond to a Security Incident in Your Library (May 2020)How to Respond to a Security Incident in Your Library (May 2020)
How to Respond to a Security Incident in Your Library (May 2020)
 
How to Respond to a Security Incident in Your Library - Jan. 2017
How to Respond to a Security Incident in Your Library - Jan. 2017How to Respond to a Security Incident in Your Library - Jan. 2017
How to Respond to a Security Incident in Your Library - Jan. 2017
 
Senior citizen safety tips
Senior citizen safety tipsSenior citizen safety tips
Senior citizen safety tips
 
SecurAlert May 2014 - Domestic Violence at Work
SecurAlert May 2014 - Domestic Violence at WorkSecurAlert May 2014 - Domestic Violence at Work
SecurAlert May 2014 - Domestic Violence at Work
 
Active Shooter Training for Library Employees
Active Shooter Training for Library EmployeesActive Shooter Training for Library Employees
Active Shooter Training for Library Employees
 
Dealing with Challenging Patrons (June 2019)
Dealing with Challenging Patrons (June 2019)Dealing with Challenging Patrons (June 2019)
Dealing with Challenging Patrons (June 2019)
 
Model appropriate behavior (2)
Model appropriate behavior (2)Model appropriate behavior (2)
Model appropriate behavior (2)
 
CSE Presentation
CSE PresentationCSE Presentation
CSE Presentation
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
 
Staff
Staff Staff
Staff
 
Senior Safety
Senior SafetySenior Safety
Senior Safety
 
How to Keep your Senior Parents Safe
How to Keep your Senior Parents SafeHow to Keep your Senior Parents Safe
How to Keep your Senior Parents Safe
 
Child protection issues
Child protection issuesChild protection issues
Child protection issues
 
Mandatory reporting 2020
Mandatory reporting 2020Mandatory reporting 2020
Mandatory reporting 2020
 
Emotional Abuse & Domestic Violence
Emotional Abuse & Domestic ViolenceEmotional Abuse & Domestic Violence
Emotional Abuse & Domestic Violence
 
Keeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st CenturyKeeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st Century
 
Child abuse
Child abuseChild abuse
Child abuse
 
Debbault Seminar
Debbault SeminarDebbault Seminar
Debbault Seminar
 

Más de ALATechSource

Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)
Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)
Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)ALATechSource
 
Dealing with Mental Health on the Front Lines: Part 1
Dealing with Mental Health on the Front Lines: Part 1Dealing with Mental Health on the Front Lines: Part 1
Dealing with Mental Health on the Front Lines: Part 1ALATechSource
 
Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)
Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)
Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)ALATechSource
 
Using Visual Arts in Early Childhood Programming
Using Visual Arts in Early Childhood ProgrammingUsing Visual Arts in Early Childhood Programming
Using Visual Arts in Early Childhood ProgrammingALATechSource
 
Serving Children with Autism Spectrum Disorder (Feb. 2019)
Serving Children with Autism Spectrum Disorder (Feb. 2019)Serving Children with Autism Spectrum Disorder (Feb. 2019)
Serving Children with Autism Spectrum Disorder (Feb. 2019)ALATechSource
 
Library Website Rehab: Promotional Webinar
Library Website Rehab: Promotional WebinarLibrary Website Rehab: Promotional Webinar
Library Website Rehab: Promotional WebinarALATechSource
 
Taking STEAM Programs to the Next Level
Taking STEAM Programs to the Next LevelTaking STEAM Programs to the Next Level
Taking STEAM Programs to the Next LevelALATechSource
 
Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)
Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)
Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)ALATechSource
 
Creating a Social Media Policy for Your Library (January 2019)
Creating a Social Media Policy for Your Library (January 2019)Creating a Social Media Policy for Your Library (January 2019)
Creating a Social Media Policy for Your Library (January 2019)ALATechSource
 
Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)
Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)
Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)ALATechSource
 
Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...
Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...
Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...ALATechSource
 
Fake News, Real Concerns: Developing Information-Literate Students (December ...
Fake News, Real Concerns: Developing Information-Literate Students (December ...Fake News, Real Concerns: Developing Information-Literate Students (December ...
Fake News, Real Concerns: Developing Information-Literate Students (December ...ALATechSource
 
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)ALATechSource
 
Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)ALATechSource
 
Engaging Learners through Active Instruction and Assessment
Engaging Learners through Active Instruction and AssessmentEngaging Learners through Active Instruction and Assessment
Engaging Learners through Active Instruction and AssessmentALATechSource
 
Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)ALATechSource
 
AL Live: What Do the Midterms Mean for Your Library? (November 2018)
AL Live: What Do the Midterms Mean for Your Library? (November 2018)AL Live: What Do the Midterms Mean for Your Library? (November 2018)
AL Live: What Do the Midterms Mean for Your Library? (November 2018)ALATechSource
 
Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)ALATechSource
 
Prepare for the Future: Tech Strategies You Need to Know (November 2018)
Prepare for the Future: Tech Strategies You Need to Know (November 2018)Prepare for the Future: Tech Strategies You Need to Know (November 2018)
Prepare for the Future: Tech Strategies You Need to Know (November 2018)ALATechSource
 
Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...
Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...
Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...ALATechSource
 

Más de ALATechSource (20)

Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)
Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)
Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)
 
Dealing with Mental Health on the Front Lines: Part 1
Dealing with Mental Health on the Front Lines: Part 1Dealing with Mental Health on the Front Lines: Part 1
Dealing with Mental Health on the Front Lines: Part 1
 
Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)
Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)
Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)
 
Using Visual Arts in Early Childhood Programming
Using Visual Arts in Early Childhood ProgrammingUsing Visual Arts in Early Childhood Programming
Using Visual Arts in Early Childhood Programming
 
Serving Children with Autism Spectrum Disorder (Feb. 2019)
Serving Children with Autism Spectrum Disorder (Feb. 2019)Serving Children with Autism Spectrum Disorder (Feb. 2019)
Serving Children with Autism Spectrum Disorder (Feb. 2019)
 
Library Website Rehab: Promotional Webinar
Library Website Rehab: Promotional WebinarLibrary Website Rehab: Promotional Webinar
Library Website Rehab: Promotional Webinar
 
Taking STEAM Programs to the Next Level
Taking STEAM Programs to the Next LevelTaking STEAM Programs to the Next Level
Taking STEAM Programs to the Next Level
 
Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)
Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)
Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)
 
Creating a Social Media Policy for Your Library (January 2019)
Creating a Social Media Policy for Your Library (January 2019)Creating a Social Media Policy for Your Library (January 2019)
Creating a Social Media Policy for Your Library (January 2019)
 
Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)
Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)
Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)
 
Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...
Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...
Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...
 
Fake News, Real Concerns: Developing Information-Literate Students (December ...
Fake News, Real Concerns: Developing Information-Literate Students (December ...Fake News, Real Concerns: Developing Information-Literate Students (December ...
Fake News, Real Concerns: Developing Information-Literate Students (December ...
 
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
 
Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)
 
Engaging Learners through Active Instruction and Assessment
Engaging Learners through Active Instruction and AssessmentEngaging Learners through Active Instruction and Assessment
Engaging Learners through Active Instruction and Assessment
 
Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)
 
AL Live: What Do the Midterms Mean for Your Library? (November 2018)
AL Live: What Do the Midterms Mean for Your Library? (November 2018)AL Live: What Do the Midterms Mean for Your Library? (November 2018)
AL Live: What Do the Midterms Mean for Your Library? (November 2018)
 
Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)
 
Prepare for the Future: Tech Strategies You Need to Know (November 2018)
Prepare for the Future: Tech Strategies You Need to Know (November 2018)Prepare for the Future: Tech Strategies You Need to Know (November 2018)
Prepare for the Future: Tech Strategies You Need to Know (November 2018)
 
Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...
Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...
Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...
 

Último

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 

Último (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 

Albrect: How to Respond to a Security Incident Workshop

  • 1. How to Respond to a Security Incident at Your Library Dr. Steve Albrecht, PHR, CPP, BCC San Diego, CA 619-990-2685 drsteve@drstevealbrecht.com
  • 2.
  • 3. Your Personal Safety Consistent policies and approaches to challenging people. Customer Service Skills
  • 4. Some Themes . . . Profiles or behaviors? Peace or justice? What should asking for help mean? Chain of command or not? How do we align with patrons? If there are no consequences . . . Acting skills . . . Do your job or do your job safely? If it’s measured, it can be managed.
  • 5. Code of Conduct In my perfect world, your facility would post the Code of Conduct in many visible locations, in poster-sized versions. Putting the Code of Conduct on a clipboard behind the Circulation Desk or only on your web site, is not enough. In my perfect world, the Code of Conduct language would be written positively, and in plain English, not legalese.
  • 6. Tough Situations Entitled, angry, threatening, or eccentric patrons. Unruly children and teenagers (and animals). Stalking behaviors by patrons. Domestic violence comes to the library. No security and missing police. Door dashers, gate crashers, and thieves. The homeless and the mentally ill. Criminals, substance abusers, gang members. Internet hogs and Internet creeps. Stinkers, talkers, smokers, bathers, eaters, and sleepers.
  • 7. The Need for Rules of Conduct: Business Impact Smoking (E-cigarettes?). Soliciting for money. Interfering with the safe use of the library. Misusing the Internet. Bikes or skateboards. Theft or vandalism. Misuse of restrooms. Shirts and shoes.
  • 8. The Need For Rules of Conduct: Business Impact Unattended children. Service animals versus “comfort” animals. Sleeping. Food and drink. Electronic devices – use or noise. Hygiene. Unattended belongings. Blocking aisles and exits.
  • 9. Law Enforcement Support In my perfect world, a police officer or sheriff’s deputy would visit your facility nearly every day, at different times. Have staff put the Dispatch numbers into their cell phones. Have your Director(s) call the Watch Commander and ask for regular or extra patrols. Create a hangout environment for the officers or deputies. Write incident reports with victim, suspect, witness information.
  • 10. Introduce / Ask / Explain Introduce yourself. Try to get the person’s name. Explain: “I noticed that . . . “ “The reason I’m here is . . .” “I’m sure you already know this, but . . .” Ask: “I need to ask you to . . .”“I need to ask you to . . .”
  • 11.
  • 12. Typical Security-Related Incidents Angry, challenging, threatening, or eccentric patrons. Unruly younger kids, difficult teenagers, with or without their parents. Patrons with personal or sexual boundary problems with patrons or staff. Domestic violence involving patrons or staff.
  • 13. Typical Security-Related Incidents Chronically homeless. Mentally ill people. Gang members. Substance abusers. Internet misusers. Rule violators.
  • 14. Typical Security-Related Incidents Angry, challenging, threatening, or eccentric patrons. Entitled, difficult, not always willing to listen or comply. Use venting and validation. Consider the best service “alignment.” Use space and distance – arm’s length plus. Use proxemic barriers if your safety is at risk. Change the ratios of confrontation: get help. “I can’t help you if you yell at me or threaten me.” Call the police or use code words to alert a colleague.
  • 15. Typical Security-Related Incidents Unruly younger kids, difficult teenagers, with or without their parents. Not always great at following The Rules. “You can’t do that if you want to stay here.” Separate groups of teenagers; talk to one. Tactful conversations with the parent(s). Age / race / gender alignment with staff? Peer pressure and hyper-embarrassment issues? Firm, fair, consistent; enforce consequences daily. Patience versus “business impact.”
  • 16. Typical Security-Related Incidents Patrons with personal or sexual boundary problems with patrons or staff. Inappropriate conversations, flirting, unwanted attention. Using the Internet to cyberstalk or stalk patrons or staff. Patrons who make physical or sexual contact with staff or patrons. Illegal sexual behavior is a sign of escalation. Pedophiles: Trust your intuition and call the police.
  • 17. Typical Security-Related Incidents Domestic violence involving patrons or staff. Victims or perpetrators who come to the library. Staff members with domestic violence issues that crossover from home to work. Child custody issues? The library as neutral territory? EAP referrals? Creative HR responses? Location change? DV advocates, social services, police intervention.
  • 18. Typical Security-Related Incidents Chronically homeless. People with “poly-problems”: mental illness, substance abuse, poor social skills. People who bring their pets, worldly goods, bags (and bags and bags), children, and friends. Use space and distance and humane treatment. Set early boundaries. Meet with the group leaders. Ask for their help. Meet regularly with homeless advocacy groups and agencies. Don’t take “We can’t do much” for an answer.
  • 19. Typical Security-Related Incidents Mentally ill people. Undiagnosed, under-treated, under-medicated, wrongly- medicated, self-medicated. Fearful, angry, confused, aggressive, delusional, psychotic. Know the three-type criteria and get help from social services and police. Consider restraining orders for the chronically problematic.
  • 20. Typical Security-Related Incidents Gang members. Not just kids who sag their pants or wear hats sideways, but gangsters, who belong to a criminal organization. High degree of hypersensitivity to being slighted, especially in front of their pals and their girls. Remove tagged material and get graffiti repaired. Watch for vandalism, drug sales, intimidation, recruiting. Call police and local groups related to gang suppression.
  • 21. Typical Security-Related Incidents Substance abusers. Some people can handle their goodies; some cannot. It is illegal to be high on drugs or alcohol and not in control. Alcohol users and drug users are erratic. Opiate and cannabis drug users tend to be more mellow (tiny pupils). Stimulant drug users are highly-problematic (huge pupils). Ask them to leave. Use space and distance. Call the police.
  • 22. Typical Security-Related Incidents Internet misusers. Hogs or oddballs? Time-wasting or porn? Business impact? Remind them of your policies each time, including personal device use policies. Use the power of filters, time limiters, separation, and careful peer pressure.
  • 23. Typical Security-Related Incidents Rule violators: entitled, ignorers, thieves, kid-leavers. “I pay your salary. I want to speak to your supervisor. I’ve been coming here since before you were born. I know the Mayor. You can’t tell me what to do.” Oblivious or intentionally disregards rules and policies. Watch for theft and shoplift behaviors. Check eBay, Craigslist, and other sites for stolen materials. Make police reports and ask for investigative follow-ups. Recognize abandoned kids and be a mandated reporter.
  • 24. Typical Emergency Situations Medical or first-aid situations. Fires. Earthquakes. Gas leaks or chemical spills. Tornadoes, weather incidents. Flooding – plumbing or natural.
  • 25. Typical Emergency Situations Medical or first-aid situations. Major events: A B C – Airway – Breathing – Circulation Heart attacks, strokes, choking, serious cuts, compound breaks from falls. Update all first-aid kits, CPR classes, AED classes. Don’t assume people know or someone has called 911. Document all incidents and near-misses.
  • 26. Typical Emergency Situations Fires. Update your floor warden procedures. Monitor for early-warning signs: wiring, chemicals, brush fires in the city. Pull the alarms and yell for help and to get staff and patron attention. Evacuate all staff and patrons through the best exits.
  • 27. Typical Emergency Situations Earthquakes. Schedule a yearly drill. Make an evacuation decision. Have the building checked for damage before re-entering.
  • 28. Typical Emergency Situations Gas leaks or chemical spills. Follow your nose. Evacuate and call 911. Follow instructions. Assess for medical issues or claims.
  • 29. Typical Emergency Situations Tornadoes, weather incidents. Follow the weather updates carefully. Know and follow your shelter-in-place and evacuation procedures. Make good decisions as to whether to close the facility.
  • 30. Typical Emergency Situations Flooding – plumbing or natural. Old pipes + system stress = big problems Pay attention to early-warning signs. Monitor the weather. Follow first-responder advice.
  • 31. Top Ten Tips 1. Trust your intuition. 2. Be “assertively polite.” 3. Try a lighter touch first. 4. Know when to change the ratios of confrontation. 5. Stay in Condition Yellow around the public.
  • 32. Top Ten Tips 6. Change your position; use space, distance, and proxemic barriers. 7. Practice “If-Then” thinking. 8. Report every incident where you or others felt afraid. 9. Work as a team. 10. Be a shepherd.

Notas del editor

  1. Blythe: Made font bigger and changed to Calibri to make it easier to read