This document discusses best practices for food processing plant security. It recommends using security cameras to monitor activity both in real-time and for historical records. Lights should be installed effectively to deter bad behavior, using metal-halide lamps and maintaining adequate light levels. Fences at least 7 feet tall can mark boundaries and limit access points. Locks and key control systems should restrict access to authorized individuals only. Guards can monitor the facility, report incidents, and ensure security measures are followed properly under management oversight.
This document discusses best practices for food processing plant security. It recommends using security cameras to monitor activity both in real-time and for historical records. Lights should be installed effectively to deter bad behavior, using metal-halide lamps and maintaining adequate light levels. Fences at least 7 feet tall can mark boundaries and limit access points. Locks and key control systems should restrict access to authorized individuals only. Guards can monitor the facility, report incidents, and ensure security measures are followed properly under management oversight.
This document discusses best practices for food processing plant security. It recommends using security cameras to monitor activity both in real-time and for historical records. Lights should be installed effectively to deter bad behavior, using metal-halide lamps and maintaining adequate light levels. Fences at least 7 feet tall can mark boundaries and limit access points. Locks and key control systems should restrict access to authorized individuals only. Guards can monitor the facility, report incidents, and ensure security measures are followed properly under management oversight.
Security at food-processing plants can take many forms, from cameras and guards to lights and fencing. What security measures are right for your company?
W ith increasing government imposed
guidelines, it is important to under- stand how your food-processing facility can ben- efit from physical security measures. Here are a few options for you to consider.
CAMERAS. Even Superman cannot be in all
places at once. So how can we expect a food se- curity team to keep an eye on every employee 24 hours a day? Security cameras are valuable additions to any facility’s food security program. They are used to monitor and record suspicious activity. There are two different types of CCTV (close circuit television) monitoring. Historical moni- toring involves placing security cameras in vari-
AIB QUARTERLY WINTER 2004/2005 13
Best Practices ous locations in order to record activity. In- by a photoelectric cell and not by a switch system. He or she will assign keys, keep a stead of assigning an employee to monitor or timer. log of those who have keys, and collect keys the activity in real time, you simply record • Lights should be surveyed on a fre- from individuals removed from designated and save the footage for historical purposes. quent basis to ensure they are working and locations. Key control is necessary for em- When an activity occurs, you can review that enough light is provided. ployees, vendors, contractors, etc. to ensure the tape to determine what happened and the food-processing facility remains secure capture the image of the criminal perform- FENCES. Do you need a fence for your food at all times. ing the act. The downfall to historical moni- security program? If so, here is some infor- Locks should be tested periodically to en- toring is that you cannot prevent incidents mation that may assist you in determining sure they are still functioning as designed. from occurring. It is used as evidence after This could be part of a regular security au- the activity has occurred. Employees should dit conducted by the security coordinator understand that help will not be coming in One of the best ways to or designated personnel. One of the most the event of an attack because no person is prevent food security common issues during a security audit is currently monitoring the activity. that unauthorized individuals have access Real-time monitoring is very beneficial, incidents at a facility is to to keys or locks. For example, employees may but requires a huge commitment from the share electronic key codes or duplicate keys. company. At least one person must moni- use light effectively. Lights There are many different types of locks tor the cameras during all working hours deter people from doing bad that can be used. The level of security and potentially during down periods. This needed for the access point will usually type of monitoring can be very expensive things because they feel they determine what type of lock is required. A secu- to the company, but is beneficial in record- rity consultant or locksmith should be consulted ing and possibly preventing events from oc- are being watched. for proper selection and application. curring. You should determine the type of moni- location, type of fence, and installation. GUARDS. Guards are not uncommon in toring that is best for you based on your Fences should be placed 3-5 feet inside food plants. They can be very beneficial to facility’s size, budget, staff capabilities, etc. the property line to allow proper mainte- a company’s security program. The most Either type is valuable and provides some nance of trees, shrubs, and undergrowth on important element of guard services is man- level of security. Remember, even Super- the outside of the fence. The minimum agement. A common failure in a food plant man couldn’t watch everyone at once, so fence height should be at least 7 feet above is to hire a guard service, implement the how can we expect that of our food secu- your finished grade in order to minimize service, and not provide any supervision. rity team? access. If the fence is only used to mark A supervisor, most commonly the security property boundaries in a low-risk environ- coordinator, should be assigned to oversee LIGHTS. One of the best ways to prevent ment, lower heights can be used. It is rec- guards and ensure they are providing the food security incidents at a facility is to use ommended that the fence be made of 2 ½- required services. light effectively. Lights deter people from 9” gauge galvanized mesh to allow view- The main function of a guard is to moni- doing bad things because they feel they are ing. A three-strand barbed wire guard (fac- tor and report. Any security incident iden- being watched. To provide effective light- ing out) will provide maximum protection. tified by the guards should be reported to ing around your facility, follow these simple As for the installation of the fence, be the facility contact. Regular, written reports rules: sure to bury it and ensure that it follows are an effective method of providing feed- • Recommend metal-halide lamps in ar- the contour of the grounds. Make sure gates back to the facility. Written work instruc- eas away from the building. Metal-halide match it in strength and texture. Also, make tions should be designated for each guard provides the best color rendition for the use sure you have visibility through the fence position so they know exactly what the of security cameras. (Note: When buying at all times by keeping vegetation trimmed company requires of them. Assignments cameras, choose the camera first and then back. may include monitoring incoming employ- match the lighting as it is more cost effec- ees, visitors and vehicles, conducting regu- tive.) LOCKS. Locks are used to control access to lar security inspections, monitoring CCTV • Recommend 2-5 footcandles for most various entry points in the facility. They (closed circuit television) systems, etc. The exterior locations. can be used on buildings, rooms, cabinets, instructions should clearly define what tools • Recommend 5-10 footcandles for equipment, etc. In order for locks to func- are needed in order to conduct their du- most gates, employee and visitor entrances, tion properly, key control is essential. ties. Most guards in U.S. facilities will not walkways, loading docks, and other areas Implementing a control program for any be armed as this may create a larger issue monitored by security cameras. type of key is critical to ensure that only for the facility. AIB • Recommend vandal-resistant lenses for authorized individuals are allowed to ac- lights less than 10 feet high. cess restricted areas. The security coordi- Stevenson is Director, Product Quality/IP Systems, AIBI and Reeves is Project Coordinator, AIBI. • Lights should be controlled (on/off) nator should monitor the key management