(5) Procedures which will insure supporting personal ID plus checking
of visitor cards or badges at restricted area entrances.
(6) Procedures for escorting visitors through
areas where an
uncontrolled person could acquire unauthorized data.
visitors should be escorted at all times.
(7) Controls which will recover
expiration, or when no longer required.
(8) Twenty-four hours advance approval when possible. Where needed,
the post should prepare a schedule for the visit, and the post should
designate an escort officer.
It is a must that they have the full cooperation of employees.
These should be educated, and they should be encouraged to assume this
They should also be instructed to consider each
unidentified or improperly identified person as a trespasser.
In these cases,
employees should report movement of person to unauthorized zones.
14. Control Movement of Employees After Hours. A system should be kept for
the control of personnel after hours. The guard force can then record their
Often, persons may have valid reasons for staying later.
The person, however, may be involved with some illegal act not readily
By recording the name, departure time, and badge number, if
available, a permanent record can be established.
The person could be
questioned at a later time if anything happened on the post during the time
they remained late.
No person should be allowed admittance to re-enter a
restricted or sensitive area without proper authorization. This can be oral
Officially designated persons of the post grant this
a. Signs/Countersigns and Code Words.
Sign/countersign systems and
code words may be used in certain security areas. Proper safeguards must be
established to ensure constant checking and testing of the systems.
will assure immediate change when the sign/countersign or code word is
Sometimes more controls are required.
If so, the security
management system or security police orders should provide instructions.
b. Duress Code.
This is a word or phrase which can be fitted into
normal conversation. It is used when guards or other personnel are forced
to vouch for unauthorized persons.
The aim of these persons is to gain
entry to a security area.
When such a system is used, you must ensure
immediate support; any security person giving or receiving the signal must
receive prompt aid.
The duress code should be simple, and it must be
changed often to lessen the chances of its compromise.