Access Control System
A combination of hardware and software that regulates who can enter campus buildings and restricted areas, and when.
Active Assailant Response
Policies, training, and tactics used to respond to an individual attempting to harm people on campus with a weapon.
Alert Notification System
A platform that sends urgent messages via text, email, voice, and apps to warn the campus community about emergencies.
Behavior Threat Assessment
A multidisciplinary process for evaluating concerning behaviors and determining appropriate interventions before violence occurs.
Blue Light Phone
An emergency call station with a highly visible blue light that connects users directly to campus safety personnel.
Building Hardening
Physical upgrades to facilities, such as reinforced doors and glazing, to make unauthorized entry and attacks more difficult.
Camera Coverage Map
A documented layout showing where security cameras are installed and what areas they monitor on campus.
Chain of Custody
The documented handling of physical or digital evidence to maintain integrity from collection through legal proceedings.
Crisis Communications Plan
A structured plan that defines how information will be created, approved, and shared during emergencies.
CPTED (Crime Prevention Through Environmental Design)
A design approach that uses lighting, sightlines, and landscaping to deter criminal behavior.
Door Hardware
The locks, closers, hinges, and related components that control how doors operate and secure campus spaces.
Drill Exercise
A scheduled practice activity in which staff and students rehearse responses to scenarios such as lockdowns or evacuations.
Duty of Care
The legal and ethical obligation of institutions to take reasonable steps to protect students, staff, and visitors from foreseeable harm.
Emergency Management Plan
A comprehensive document outlining campus preparedness, response, recovery, and mitigation strategies.
Emergency Operations Center (EOC)
A designated location from which officials coordinate resources and decisions during major incidents.
Emergency Mass Notification System (EMNS)
A multi-channel communication system used to rapidly alert large populations to imminent threats.
Evacuation Route
A planned and clearly marked path for safely exiting buildings or areas during an emergency.
Facial Recognition Policy
Institutional rules that govern whether and how biometric identification technology is used on campus.
Full-Scale Exercise
A realistic, multi-agency emergency drill that tests plans, equipment, and coordination under simulated conditions.
Gun Detection Technology
Systems using sensors or analytics to identify the presence of firearms and trigger alerts.
Guard Tour System
Technology that verifies where and when security officers have patrolled assigned routes.
Incident Command System (ICS)
A standardized structure for managing emergency response roles, communication, and resources.
Incident Management Software
A digital platform used to log, track, and analyze safety and security incidents across campus.
Integrated Security Platform
A system that connects access control, video, alarms, and other security technologies into a unified interface.
Key Control Program
Procedures for issuing, tracking, and recovering physical keys to maintain building security.
K-12 Campus Perimeter
The defined boundary around a school property that is monitored and protected to limit unauthorized access.
License Plate Recognition (LPR)
Technology that automatically reads vehicle plates to manage parking, access, or investigations.
Lockdown Procedure
A set of steps to quickly secure classrooms and buildings when an immediate threat is present.
Mass Notification
The rapid dissemination of critical information to large groups via multiple communication channels.
Metal Detection Screening
The use of walk-through or handheld detectors to identify concealed weapons at campus entry points.
Mission-Critical Infrastructure
Facilities and systems, such as data centers and utilities, whose failure would seriously disrupt campus operations.
Panic Button
A fixed or mobile device that allows staff to silently request immediate security or law enforcement assistance.
Perimeter Security
The combination of fencing, lighting, surveillance, and access controls used to protect the edges of campus property.
Physical Security Information Management (PSIM)
Software that aggregates data from multiple security systems into a single operational view.
Resilience Planning
The process of preparing campus systems and communities to absorb, adapt to, and recover from disruptive events.
Risk Assessment
A systematic evaluation of threats, vulnerabilities, and potential impacts to prioritize security investments.
Run-Hide-Fight Protocol
A widely used guidance for civilians during an active shooter event: escape if possible, hide if necessary, and resist as last resort.
Security Operations Center (SOC)
A dedicated space where personnel monitor security systems and coordinate responses around the clock.
Situational Awareness
The continuous perception and understanding of what is happening in the environment to inform timely decisions.
Social Media Monitoring
The review of public social media posts to detect threats, rumors, or safety concerns affecting campus.
Standard Response Protocol (SRP)
A set of clear, plain-language actions such as lockdown, lockout, evacuate, and shelter used during incidents.
Student Conduct Policy
Formal rules governing student behavior, including violations that may affect campus safety.
Surveillance Camera System
A network of security cameras and recording devices used to deter crime and support investigations.
Tailgating (Access Control)
When an unauthorized person follows an authorized user through a controlled doorway without proper authentication.
Threat Intelligence Feed
External or internal data streams that provide information about emerging security threats relevant to campuses.
Two-Factor Authentication for Access
A requirement that users present two forms of verification, such as a badge and PIN, to enter secure areas.
Visitor Management System
A process and technology for registering visitors, printing badges, and tracking who is on campus.
Video Analytics
Software that analyzes video streams to detect behaviors or conditions such as loitering, intrusion, or crowding.
Vulnerability Assessment
An evaluation that identifies weaknesses in facilities, procedures, or technology that could be exploited by threats.