© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Fundamentals of Church Safety Overview & Objectives © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Church Safety Hoody Clip © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 1 Why a Church Safety Policy? “To provide the Celebrate Church Community with a safe and secure environment in which to worship and serve the Kingdom “Because People Matter.” © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Preventing Harm God promises to protect us but… Expects us to make smart decisions Jews and early Christians took sensible actions for protection We must do the same “But we prayed to our God and posted a guard day and night to meet this threat.” Nehemiah 4:9 © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Threats to Churches… Hijack Extortion Shooter Kidnap Disasters Looting CPPS2012 2012 | |Proprietary Proprietary Information Information | | All Allrights rightsreserved reserved | |Do Donot notcopy, copy,reproduce reproduceor ordistribute distribute ©©CPPS 2 A Church Safety Program is No Longer an Option!!! © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Protecting the “Flock” Typical issues we face include: Emergency Response/Crisis Management: • • • • • • • • • Medical Issues Domestic/Parental Custody Theft Sexual Harassment/Assault/Abuse Unruly/Unstable Individuals Violent persons Lost/Missing Children Child/Parent Custodial issues Active Shooter © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Ministry Continuity Deals with the consequences upon and loss of: • People • Facilities • Systems • Information • Supply Chain Components CPPS2012 2012 | |Proprietary Proprietary Information Information | | All Allrights rightsreserved reserved | |Do Donot notcopy, copy,reproduce reproduceor ordistribute distribute ©©CPPS 3 Effective Church Safety & Security The time to learn about Church Safety & Security IS NOT During a CRISIS!! © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Challenges For Churches Diverse organizations & cultures Not safety conscious Limited info sharing Image conscious Ministry Funds limited Different view by Law Enforcement © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Why Plan? We play as we practice No substitute for planning and preparation A good plan assists in the successful management of a crisis Minimizes disruption to day-to-day business operations Provides a structured approach Greatly increases probability of successful outcome © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 4 Developing a Church Safety Policy Cornerstone of any Emergency Response Plan Must be comprehensive Provides the organizational “rules of the road” © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Planning Roadmap Risk & Needs Assessment Church Leadership Support Ministry Safety Policy Determine/Garner Resources Team Recruitment Training, Training Training “Harmonious” Liaison with other Ministries Implementation © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Church Risk & Needs Assessment Review the challenges / risks you face. Comprehensive & Specific “Reflective” of your church culture and mission. © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 5 Church Risk Assessment Questions Profile? Demographics? Location? Activities? Types of Ministries? © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Total Risk Assessment Methodology IDENTIFY ASSESS EVALUATE • • • • • Context of Likelihood & Impact What are we doing? What should we be doing? Prioritization – What can we do? MITIGATION • • Know the risks Mitigate – Transfer – Avoid – Other… Plan of action + who does it… MONITOR • Check-ups & Dashboards © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Starting point for analysis Reputational Security of risks physical assets Business Security culture of risks personnel • Risk Identification by category Legal & institutional risks • Wide range of risks Basic Menu of Risks • BASIC RISKS Economic risks Security of financial assets Political risks “What Price Reputation? Many savvy companies are starting to realize that a good name can be their most important asset…” - Business Week 2007 © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 6 Cybercrime This poster released by the FBI shows photos of individuals wanted by the FBI and shows Eastern European Cyber Criminals, wanted on a variety of federal charges stemming from criminal activities including money laundering, bank fraud, passport fraud, and identity theft in New York. Complaints were issued by the United States District Court, Southern District of New York, in September of 2010. The court records of Operation Trident Breach reveal a surprise: For all the high-tech tools and tactics employed in these computer crimes, platoons of low-level human foot soldiers, known as "money mules," are the indispensable cogs in the cybercriminals' money machine. (AP Photo/FBI) © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Catholic Diocese, Des Moines, Iowa Date: August 13 – 16, 2010 Victims: $680,000 Offenders: East European Cyber Criminals Incident: Cybercrime © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Cheap Church Websites Hacked More than 18 churches affected Muslim Content Posted July 2011 © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 7 Cybercrime Involves criminal activity using computers and the internet • • • • Identity theft Financial theft Stalk victims Disrupt operations with malevolent programs © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Cybercrime Phishing Vishing/Smishing Pharming Social Networks Pop-up Ads Text messages sent to cell phones © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute What You Can Do Do not open emails from unknown sources Do not open links/attachments directly from emails Check vendor websites to make sure secure before entering sensitive information Be wary of emails from financial institutions asking to confirm sensitive information Keep a detailed record of all transactions Turn computer off when not in use © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 8 What You Can Do Train employees not to give out personal information on attendees Check what leaves the building through the trash Limit access to servers and network equipment Implement password changes/sharing Protect computers from viruses and spyware © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute What You Can Do Wi-Fi networks should be protected Access to backups should be secured Laptops with attendee private information on the local drive should be encrypted Educate volunteers on your information security practices Never feel like you’re finished © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Safety & Security Policy (SSP) Do you have a PLAN? • • Who has a copy? Is it disseminated? Do key managers outside of senior staff know it exists & what is expected? When was it last reviewed? When was it last exercised? © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 9 Developing a Church Safety Policy Policy Statements Standard Operating Procedures (SOPS) Examples of pertinent forms and documents Develop Church Safety Team Manual • • • • Outline of operations Chain of authority Procedures Emergency contacts Consider developing “Checklists” © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute A Church Security Assessment Checklist Designated Person Responsible for Safety? Youth/Child Protection Policy? Financial Protection Policy? Facility Protection Plan? Transportation Policy? Personnel Protection Plan (Staff, Members, Visitors)? Emergency Response Plan? Designated Attorney to Approve Policies? Missions Policy? © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute “Walk-in” and Visitor Policies Coordinated Consistent Communicated © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 10 Nine Useful Tips 1. Get Support & Help • 2. Top down & bottom up • Consultants Partners 7. Start Small 8. • • • • • Break it down Milestones Build inertia Advocate Specific / Measurable / Attainable / Realistic / Timely – S M A R T Go for Quick Wins 6. Get Resources • 4. • Executive Buy-in helps • 3. Keep it Simple 5. You can’t do it alone “Low hanging fruit” Develop “Soft Skills” • It’s a people business FIRST Question the Source • 9. Use what works for YOU Look Far & Wide © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Ministry Safety Operations Church Safety Team Planning © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute So…Where are you ? No Program Thinking about a Program Beginning a Program Updating the policies & procedures to an existing Program © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 11 Security Team Planning Where to start? What to do? Who to talk to? © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Leadership Support Management “Buy-In” Critical Include in Risk & Needs Assessment process Empower to be “part of the solution.” Remember, they control the “purse strings.” © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Determining/Garnering Resources Dependant upon… • • • • • • Organizational Culture Size Mission Personnel Availability Financial Resources Anticipated Ministry Program Scope “But what about resources?” © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 12 Suggested Equipment List - Basic Radios and surveillance kits Flashlights First aid bag and contents AED (if trained) ID Card, shirts, etc. © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Team Recruitment & Training Be sure leadership actively involved • If available, and willing… • • • • • Recruitment/selection of Ministry Leader and initial “Start-up” Team Members. Current and former police officers Military Paramedics EMT’s Other security professionals Interview and vet • Thorough background checks a MUST prior to selection © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Site Security Plan Site Site Location Date & Time of Event Contacts Site Description Scenario Team Assignments General Instructions – Specific Site Security Media/Press REACT Instructions – © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 13 Armed vs. Unarmed Security Team Members Factors to consider: • • • • • • Team Composition Risk to Others Level of Training, Experience & Proficiency Vocation Consult Insurance Provider State & local laws © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Armed vs. Unarmed Security Team Members Ultimately, each church/ministry must decide for themselves… © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Team Training Basics Define the teams duties and roles Basic radio operation and communication Completing an incident report Basic First Aid, CPR and AED Dealing with the staff Dealing with the congregation Dealing with unruly people Children's security procedures Use of force limitations, etc. © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 14 Liaison with other Ministries Why meet with other ministries? • • Explain the mission of the security ministry to better understand your needs Better understand their mission and plans Key Ministries to meet with: • • • • Children Youth Worship Facilities Parking Ushers Greeters Missions © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Before Implementing Ministry Meet with the local Police, EMT and Fire Departments • Advise them you exist • Understand their capabilities • Share your capabilities • Help them understand your facility and needs • Review their response times to your facility © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 5 Things you can do right now… 1. Designate a Security Lead within your church 2. Develop and maintain a Church Safety Plan (SSP) 3. Train Church Leadership & Staff on content of the SSP 4. Practice the SSP 5. Involve local Law Enforcement in the SSP © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 15 Network… MSC Minneapolis, 7 Jun 2010 – Post Conference Mtg. © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute Questions?? © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute © CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute 16