You are on page 1of 2

Best Practices

By Paul Stevenson and Lance Reeve

Security at food-processing plants can take many forms, from cameras and guards
to lights and fencing. What security measures are right for your company?

W ith increasing government imposed


guidelines, it is important to under-
stand how your food-processing facility can ben-
efit from physical security measures. Here are a
few options for you to consider.

CAMERAS. Even Superman cannot be in all


places at once. So how can we expect a food se-
curity team to keep an eye on every employee
24 hours a day? Security cameras are valuable
additions to any facility’s food security program.
They are used to monitor and record suspicious
activity.
There are two different types of CCTV (close
circuit television) monitoring. Historical moni-
toring involves placing security cameras in vari-

AIB QUARTERLY WINTER 2004/2005 13


Best Practices
ous locations in order to record activity. In- by a photoelectric cell and not by a switch system. He or she will assign keys, keep a
stead of assigning an employee to monitor or timer. log of those who have keys, and collect keys
the activity in real time, you simply record • Lights should be surveyed on a fre- from individuals removed from designated
and save the footage for historical purposes. quent basis to ensure they are working and locations. Key control is necessary for em-
When an activity occurs, you can review that enough light is provided. ployees, vendors, contractors, etc. to ensure
the tape to determine what happened and the food-processing facility remains secure
capture the image of the criminal perform- FENCES. Do you need a fence for your food at all times.
ing the act. The downfall to historical moni- security program? If so, here is some infor- Locks should be tested periodically to en-
toring is that you cannot prevent incidents mation that may assist you in determining sure they are still functioning as designed.
from occurring. It is used as evidence after This could be part of a regular security au-
the activity has occurred. Employees should dit conducted by the security coordinator
understand that help will not be coming in
One of the best ways to or designated personnel. One of the most
the event of an attack because no person is prevent food security common issues during a security audit is
currently monitoring the activity. that unauthorized individuals have access
Real-time monitoring is very beneficial, incidents at a facility is to to keys or locks. For example, employees may
but requires a huge commitment from the share electronic key codes or duplicate keys.
company. At least one person must moni-
use light effectively. Lights There are many different types of locks
tor the cameras during all working hours deter people from doing bad that can be used. The level of security
and potentially during down periods. This needed for the access point will usually
type of monitoring can be very expensive things because they feel they determine what type of lock is required. A secu-
to the company, but is beneficial in record- rity consultant or locksmith should be consulted
ing and possibly preventing events from oc-
are being watched. for proper selection and application.
curring.
You should determine the type of moni- location, type of fence, and installation. GUARDS. Guards are not uncommon in
toring that is best for you based on your Fences should be placed 3-5 feet inside food plants. They can be very beneficial to
facility’s size, budget, staff capabilities, etc. the property line to allow proper mainte- a company’s security program. The most
Either type is valuable and provides some nance of trees, shrubs, and undergrowth on important element of guard services is man-
level of security. Remember, even Super- the outside of the fence. The minimum agement. A common failure in a food plant
man couldn’t watch everyone at once, so fence height should be at least 7 feet above is to hire a guard service, implement the
how can we expect that of our food secu- your finished grade in order to minimize service, and not provide any supervision.
rity team? access. If the fence is only used to mark A supervisor, most commonly the security
property boundaries in a low-risk environ- coordinator, should be assigned to oversee
LIGHTS. One of the best ways to prevent ment, lower heights can be used. It is rec- guards and ensure they are providing the
food security incidents at a facility is to use ommended that the fence be made of 2 ½- required services.
light effectively. Lights deter people from 9” gauge galvanized mesh to allow view- The main function of a guard is to moni-
doing bad things because they feel they are ing. A three-strand barbed wire guard (fac- tor and report. Any security incident iden-
being watched. To provide effective light- ing out) will provide maximum protection. tified by the guards should be reported to
ing around your facility, follow these simple As for the installation of the fence, be the facility contact. Regular, written reports
rules: sure to bury it and ensure that it follows are an effective method of providing feed-
• Recommend metal-halide lamps in ar- the contour of the grounds. Make sure gates back to the facility. Written work instruc-
eas away from the building. Metal-halide match it in strength and texture. Also, make tions should be designated for each guard
provides the best color rendition for the use sure you have visibility through the fence position so they know exactly what the
of security cameras. (Note: When buying at all times by keeping vegetation trimmed company requires of them. Assignments
cameras, choose the camera first and then back. may include monitoring incoming employ-
match the lighting as it is more cost effec- ees, visitors and vehicles, conducting regu-
tive.) LOCKS. Locks are used to control access to lar security inspections, monitoring CCTV
• Recommend 2-5 footcandles for most various entry points in the facility. They (closed circuit television) systems, etc. The
exterior locations. can be used on buildings, rooms, cabinets, instructions should clearly define what tools
• Recommend 5-10 footcandles for equipment, etc. In order for locks to func- are needed in order to conduct their du-
most gates, employee and visitor entrances, tion properly, key control is essential. ties. Most guards in U.S. facilities will not
walkways, loading docks, and other areas Implementing a control program for any be armed as this may create a larger issue
monitored by security cameras. type of key is critical to ensure that only for the facility. AIB
• Recommend vandal-resistant lenses for authorized individuals are allowed to ac-
lights less than 10 feet high. cess restricted areas. The security coordi- Stevenson is Director, Product Quality/IP Systems,
AIBI and Reeves is Project Coordinator, AIBI.
• Lights should be controlled (on/off) nator should monitor the key management

14 WINTER 2004/2005 AIB QUARTERLY

You might also like