Monday, October 24, 2005

Looks like a plan

I would like to draw your attention to something I bumped into on the web while doing a little research that demonstrates a sincere effort in protecting kids. However, it goes much further than this alone by showing some important points in just a few words. Most importantly it appears to effectively blend procedures with technology. In other words, the technology only serves to enhance an already worthwhile process.

Consider these points:
  • First is the acknowledgement that not system is "foolproof." This is essential in avoiding misconceptions of impenetrable security. Too many people like to tell people just how perfect their methodology, techniques, and systems are, but this has more to do with the speaker's ego and puffery than real security. Being honest is far more useful, especially because knowing that a system is not foolproof and being told that is the difference between telling people to relinquish their concerns and asking them to remain alert or aware.
  • Second is a request for cooperation with the established procedures. This also acknowledges the contribution that the legitimate user makes to the overall success. Most systems of controls are built on an assumption of compliance, and without general compliance the process will FAIL. Consider the enforcement of speeding on the roads - nearly everyone exceeds the speed limit - creating a lack of general compliance and overwhelming the enforcement capability. Asking for the cooperation of the participant can go a long way toward getting it. Think carrot first, stick second.
  • Third there are routine procedures and contingency procedures noted. I am not saying that these procedures are all encompassing, but they are considerably more thorough than I often see. Most importantly is the lack of legalese or technical language. The procedures are clearly written and simplistic (but not overly so). There is even direction should the wristband be lost, which helps to avoid the argument should this happen without a publicized procedure.

Again, I am not saying that this document is perfect or that the system they have in place is even effectively maintianed, because that was not my point. I have never been to this organization or observed their activity, but given the presentation of the information on the web I thought it only fair to share it.

Keep in mind that good security comes from good procedures - what you do - and not necessarily from expensive equipment - what you have. Consider the "Security System" page just once more and realize that you could replace every mention of technology on that page with much more mundane tools. Consider cypher locks instead of a thumb reader and some other token rather than wristbands - the procedures still appears effective. So it would appear that there is a good marriage between technology and the operating procedures.

Sincerely. Kudos to the folks at Jersey Village for their efforts...

Rob
/

No comments:

Post a Comment