Fundamentals of Church Safety Overview & Objectives

© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Fundamentals of Church Safety
Overview & Objectives
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Church Safety Hoody Clip
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
1
Why a Church Safety Policy?
“To provide the Celebrate Church Community with a
safe and secure environment in which to worship
and serve the Kingdom “Because People Matter.”
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Preventing Harm
God promises to protect us but…
Expects us to make smart decisions
Jews and early Christians took sensible actions for
protection
We must do the same
“But we prayed to our God and posted a
guard day and night to meet this threat.”
Nehemiah 4:9
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Threats to Churches…
Hijack
Extortion
Shooter
Kidnap
Disasters
Looting
CPPS2012
2012 | |Proprietary
Proprietary Information
Information | | All
Allrights
rightsreserved
reserved | |Do
Donot
notcopy,
copy,reproduce
reproduceor
ordistribute
distribute
©©CPPS
2
A Church Safety Program is
No Longer an Option!!!
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Protecting the “Flock”
Typical issues we face include:
Emergency Response/Crisis Management:
•
•
•
•
•
•
•
•
•
Medical Issues
Domestic/Parental Custody
Theft
Sexual Harassment/Assault/Abuse
Unruly/Unstable Individuals
Violent persons
Lost/Missing Children
Child/Parent Custodial issues
Active Shooter
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Ministry Continuity
Deals with the consequences
upon and loss of:
• People
• Facilities
• Systems
• Information
• Supply Chain Components
CPPS2012
2012 | |Proprietary
Proprietary Information
Information | | All
Allrights
rightsreserved
reserved | |Do
Donot
notcopy,
copy,reproduce
reproduceor
ordistribute
distribute
©©CPPS
3
Effective Church Safety & Security
The time to learn about
Church Safety & Security
IS NOT
During a CRISIS!!
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Challenges For Churches
Diverse organizations &
cultures
Not safety conscious
Limited info sharing
Image conscious
Ministry
Funds limited
Different view by Law
Enforcement
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Why Plan?
We play as we practice
No substitute for planning and
preparation
A good plan assists in the successful
management of a crisis
Minimizes disruption to day-to-day
business operations
Provides a structured approach
Greatly increases probability
of successful outcome
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
4
Developing a Church Safety Policy
Cornerstone of any
Emergency Response
Plan
Must be comprehensive
Provides the
organizational “rules of
the road”
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Planning Roadmap
Risk & Needs Assessment
Church Leadership Support
Ministry Safety Policy
Determine/Garner Resources
Team Recruitment
Training, Training Training
“Harmonious” Liaison
with other Ministries
Implementation
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Church Risk & Needs Assessment
Review the challenges / risks you face.
Comprehensive & Specific
“Reflective” of your church culture and mission.
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
5
Church Risk Assessment Questions
Profile?
Demographics?
Location?
Activities?
Types of Ministries?
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Total Risk Assessment Methodology
IDENTIFY
ASSESS
EVALUATE
•
•
•
•
•
Context of Likelihood & Impact
What are we doing?
What should we be doing?
Prioritization – What can we do?
MITIGATION
•
•
Know the risks
Mitigate – Transfer – Avoid – Other…
Plan of action + who does it…
MONITOR
•
Check-ups & Dashboards
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Starting point for
analysis
Reputational Security
of
risks
physical
assets
Business
Security
culture
of
risks
personnel
•
Risk Identification by
category
Legal &
institutional
risks
•
Wide range of risks
Basic Menu of Risks
•
BASIC
RISKS
Economic
risks
Security
of
financial
assets
Political
risks
“What Price Reputation? Many savvy
companies are starting to realize that a good
name can be their most important asset…”
- Business Week 2007
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
6
Cybercrime
This poster released by the FBI shows photos of individuals wanted by the FBI and shows
Eastern European Cyber Criminals, wanted on a variety of federal charges stemming from
criminal activities including money laundering, bank fraud, passport fraud, and identity theft
in New York. Complaints were issued by the United States District Court, Southern District of
New York, in September of 2010. The court records of Operation Trident Breach reveal a
surprise: For all the high-tech tools and tactics employed in these computer crimes, platoons
of low-level human foot soldiers, known as "money mules," are the indispensable cogs in the
cybercriminals' money machine. (AP Photo/FBI)
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Catholic Diocese, Des Moines, Iowa
Date: August 13 – 16, 2010
Victims: $680,000
Offenders: East European Cyber
Criminals
Incident: Cybercrime
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Cheap Church Websites Hacked
More than 18 churches affected
Muslim Content Posted
July 2011
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
7
Cybercrime
Involves criminal activity using computers and
the internet
•
•
•
•
Identity theft
Financial theft
Stalk victims
Disrupt operations with malevolent programs
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Cybercrime
Phishing
Vishing/Smishing
Pharming
Social Networks
Pop-up Ads
Text messages sent to cell phones
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
What You Can Do
Do not open emails from unknown sources
Do not open links/attachments directly from
emails
Check vendor websites to make sure secure
before entering sensitive information
Be wary of emails from financial institutions
asking to confirm sensitive information
Keep a detailed record of all transactions
Turn computer off when not in use
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
8
What You Can Do
Train employees not to give out personal
information on attendees
Check what leaves the building through the
trash
Limit access to servers and network equipment
Implement password changes/sharing
Protect computers from viruses and spyware
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
What You Can Do
Wi-Fi networks should be protected
Access to backups should be secured
Laptops with attendee private information on
the local drive should be encrypted
Educate volunteers on your information security
practices
Never feel like you’re finished
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Safety & Security Policy (SSP)
Do you have a PLAN?
•
•
Who has a copy?
Is it disseminated?
Do key managers outside of
senior staff know it exists &
what is expected?
When was it last reviewed?
When was it last exercised?
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
9
Developing a Church Safety Policy
Policy Statements
Standard Operating Procedures (SOPS)
Examples of pertinent forms and documents
Develop Church Safety Team Manual
•
•
•
•
Outline of operations
Chain of authority
Procedures
Emergency contacts
Consider developing “Checklists”
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
A Church Security Assessment Checklist
Designated Person
Responsible for Safety?
Youth/Child Protection
Policy?
Financial Protection
Policy?
Facility Protection Plan?
Transportation Policy?
Personnel Protection
Plan (Staff, Members,
Visitors)?
Emergency Response
Plan?
Designated Attorney to
Approve Policies?
Missions Policy?
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
“Walk-in” and Visitor Policies
Coordinated
Consistent
Communicated
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
10
Nine Useful Tips
1.
Get Support & Help
•
2.
Top down & bottom up
•
Consultants
Partners
7.
Start Small
8.
•
•
•
•
•
Break it down
Milestones
Build inertia
Advocate
Specific / Measurable / Attainable
/ Realistic / Timely – S M A R T
Go for Quick Wins
6.
Get Resources
•
4.
•
Executive Buy-in helps
•
3.
Keep it Simple
5.
You can’t do it alone
“Low hanging fruit”
Develop “Soft Skills”
•
It’s a people business FIRST
Question the Source
•
9.
Use what works for YOU
Look Far & Wide
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Ministry Safety Operations
Church Safety Team Planning
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
So…Where are you ?
No Program
Thinking about a Program
Beginning a Program
Updating the policies &
procedures to an existing
Program
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
11
Security Team Planning
Where to start?
What to do?
Who to talk to?
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Leadership Support
Management “Buy-In”
Critical
Include in Risk & Needs
Assessment process
Empower to be “part of
the solution.”
Remember, they control
the “purse strings.”
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Determining/Garnering Resources
Dependant upon…
•
•
•
•
•
•
Organizational Culture
Size
Mission
Personnel Availability
Financial Resources
Anticipated Ministry
Program Scope
“But what about resources?”
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
12
Suggested Equipment List - Basic
Radios and surveillance kits
Flashlights
First aid bag and contents
AED (if trained)
ID Card, shirts, etc.
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Team Recruitment & Training
Be sure leadership actively involved
•
If available, and willing…
•
•
•
•
•
Recruitment/selection of Ministry Leader and initial
“Start-up” Team Members.
Current and former police officers
Military
Paramedics
EMT’s
Other security professionals
Interview and vet
•
Thorough background checks a MUST
prior to selection
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Site Security Plan
Site
Site Location
Date
& Time of Event
Contacts
Site Description
Scenario
Team
Assignments
General
Instructions – Specific
Site Security
Media/Press
REACT
Instructions –
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
13
Armed vs. Unarmed Security Team Members
Factors to consider:
•
•
•
•
•
•
Team Composition
Risk to Others
Level of Training, Experience
& Proficiency
Vocation
Consult Insurance Provider
State & local laws
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Armed vs. Unarmed Security Team Members
Ultimately, each church/ministry must
decide for themselves…
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Team Training Basics
Define the teams duties and roles
Basic radio operation and communication
Completing an incident report
Basic First Aid, CPR and AED
Dealing with the staff
Dealing with the congregation
Dealing with unruly people
Children's security procedures
Use of force limitations, etc.
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
14
Liaison with other Ministries
Why meet with other ministries?
•
•
Explain the mission of the security ministry to better
understand your needs
Better understand their mission and plans
Key Ministries to meet with:
•
•
•
•
Children
Youth
Worship
Facilities
Parking
Ushers
Greeters
Missions
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Before Implementing Ministry
Meet with the local Police, EMT and Fire
Departments
•
Advise them you exist
•
Understand their capabilities
•
Share your capabilities
•
Help them understand your facility and needs
•
Review their response times to your facility
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
5 Things you can do right now…
1.
Designate a Security Lead within your church
2.
Develop and maintain a Church Safety Plan
(SSP)
3.
Train Church Leadership & Staff on content of
the SSP
4.
Practice the SSP
5.
Involve local Law Enforcement in the SSP
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
15
Network…
MSC Minneapolis, 7 Jun 2010 – Post Conference Mtg.
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
Questions??
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
© CPPS 2012 | Proprietary Information | All rights reserved | Do not copy, reproduce or distribute
16