Community security policies are crucial. These are the backbone of your community’s post orders. Security policies are the guidelines your member service officers use when they respond to both routine and critical needs. Both the community and the contractor are responsible for creating and updating them. The community must provide reasonable expectations for the contractor. The contractor must provide an expert’s opinion.

Community Security Policies
Community security policies are a collaboration between the community and the contractor

ARM-LP communities are probably most-often campuses. Each community is different, but each community probably occupies a significant building on a fairly large lot. The campus may not be complex, like a hospital or shopping centre, but every campus requires — and security agencies promise to provide — detailed policies and procedures for the member service officers who provide security on the campus.

A security agency who won’t routinely ask its clients what they need cannot offer effective security programming.  The relationship between the community and the contractor will suffer from this negligence.

Both the campus and the contractor must have this common goal: to develop and implement effective post orders and routine security policies for your community.

Your Security PoliciesSecurity ManagementAccess ControlPeople on Property (POP)Serious Incidents

Campuses Must Have Written Community Security Policies

The community and contractor service each has a distinct responsibility: to develop and maintain post orders the community needs a trusted servant to define the community’s security needs. The trusted servant surveys security needs under the supervision of senior decision makers, such as the executive or board. This is not typically a complex process.

A contractor cannot unilaterally create a security program for your community. The contractor’s role is to observe, to suggest, and to provide an expert’s opinion on what policies and procedures will meet your community’s needs.

After you jointly establish needs? The security agency screens, trains, hires, schedules, and evaluates your member service officers. The agency’s challenge? To integrate your policies and procedures with the contractor’s policies and procedures. The agency then trains its staff to implement your security policies.

Once the Post Orders are developed? The campus is responsible to review and approve them. 

Post Orders are important community security policies. They are not the only policies you need.

Your campus must also address legal issues. Your member service officers must be aware of these policies. They must be bound by them.

A Robust Privacy Policy Use of Force Special Needs
The member service officers who provide your security work for someone else. Who is ultimately responsible if a member service officer discloses confidential information? You need a use of force policy whether or not you permit it. You need to also specify whether or not your MSOs may arrest someone.  The community must outline these issues for the security agency to develop, implement and update appropriate post orders that carry out your needs.
Your community needs to control access to the campus. Who is allowed on campus?  When are they allowed access? Where are they to enter and leave? Your contractor will craft the post orders to implement your access control policies.

Security Is Always About People

Do the member service officers who provide security directly represent your community? Do you empower them to request identification? To order people away? To direct them from one place to another?

Do the member service officers who provide security implement emergency procedures? Does the community must routinely assess the risks it faces? Do you identify the risks that have a critical impact on the community, and work with the security agency to ensure the post orders reflect these needs?

Time lost endangers people, property and revenue in a crisis. Good security agencies regular engage their clients to develop or update post orders and to establish standard operating procedures. Both the campus and the contractor benefit. The campus gets an effective and well-crafted security manual. The contractor earns a sterling reputation. The final result? A well-run security operation with up-to-date operational policies you can adapt as necessary.