January 21, 2025

Security Pix

Security Pix Your World

Why Standards and Certifications Are Crucial

Why Standards and Certifications Are Crucial

In the 2021-22 school year, 857,500 violent incidents were reported in U.S. public schools, with over 34,000 involving a weapon. In response to this surge in violence, many schools have implemented multi-layered security protocols, including visitor management, surveillance, and access control systems to protect students, staff, and visitors. But not all security protocols are created equal.

Unfortunately, there are no official “standards” for school security technologies, so many school decision-makers may choose untested or unreliable technologies, jeopardizing the safety of students and staff. Adhering to specific standards requires security providers to obtain certifications that validate the effectiveness and reliability of their systems.

Lawmakers Should Establish School Security Purchasing Standards

When lawmakers allocate taxpayer money, they have a fiduciary responsibility to ensure it’s spent on the most proven and effective solutions. Without adherence to established standards, there’s a risk that funds will be wasted on unproven technologies. In the absence of standards, tech companies can exploit schools by offering cheaper, unverified solutions that may not work in a real crisis. These solutions often lack third-party validation, leaving schools vulnerable when they need protection the most.

RELATED ARTICLE: Rethinking School Safety – Taking Action with Common Sense and Improved Standards

Another critical issue is the chronic underfunding of school security budgets. Many districts struggle to afford even the most basic security measures. While this underscores the necessity of legislative intervention to make funding available, it’s not enough to simply provide funds. Legislation must include standards and guidance to ensure that every dollar is spent wisely.

This means that legislation should play a pivotal role in establishing these standards. By including specific criteria and qualifications in funding bills, lawmakers can help ensure that schools are investing in proven, reliable security technologies. This isn’t just about protecting students and staff—it’s about being fiscally responsible and making sure taxpayer dollars are used effectively.

In the meantime, here are some of the top certifications that decision-makers should be aware of before purchasing and deploying security measures.

——Article Continues Below——

Get the latest industry news and research delivered directly to your inbox.

3 Certifications Schools Should Look for Before Purchasing Security Technology

Whether hardware or software-based, one of the most high-level and detailed certifications available in the security market is the SAFETY Act certification, awarded by the Department of Homeland Security (DHS). Obtaining this certification signifies that a technology has demonstrated proven performance through rigorous testing and consistent reliability. Certified companies provide comprehensive documentation, support, and training, and ensure their technologies are adaptable to evolving threats, incorporate effective risk mitigation strategies, and protect sensitive data. Once certified, the DHS continues to perform regular evaluations to ensure a technology can maintain its certification status.

In the educational environment, security technologies should also comply with the Family Educational Rights and Privacy Act (FERPA) to safeguard student education records. In an era where data privacy, especially for minors, is constantly threatened, schools must prioritize privacy as a top concern. To achieve FERPA compliance, these technologies must implement rigorous privacy measures, including strict access controls, data encryption, data minimization, and adherence to data handling and sharing protocols. They also have to incorporate mechanisms for obtaining and managing consent, provide comprehensive FERPA training, and ensure adherence through well-documented policies and regular audits.

RELATED ARTICLE: How to Choose the Right Public Safety and Security Technology

Another important data certification is System and Organization Controls 2 (SOC 2). Developed by the American Institute of Certified Public Accountants (AICPA), SOC 2 is specifically designed for service providers storing customer data in the cloud, though it is applicable to any organization that handles sensitive data. SOC 2 ensures that a company’s system is protected against unauthorized access, used as intended, and that its processing is complete, valid, accurate, timely, and authorized. It also ensures that information collected by these systems is used, retained, disclosed, and disposed of in conformity with the entity’s privacy notice and protected as confidential. By obtaining SOC 2 certification, organizations demonstrate their commitment to the high standards of data security and privacy.

The ability of products, services, and systems to obtain these certifications creates a sense of security and reliability within proposed safety measures. It also guarantees that schools can make informed decisions about their security investments from the start.

Prioritizing School Security Technology Standards

As we continue to navigate the complexities of school security funding, it’s essential to prioritize standards. Policymakers must work with experts to establish and maintain rigorous criteria for security technologies. This helps distinguish between companies that can deliver on their promises and those that cannot—ultimately ensuring the safety of our schools and the responsible use of taxpayer money.

Until these standards are established, school decision-makers who choose to deploy security technologies must conduct thorough evaluations to ensure that their chosen solutions meet or exceed industry standards. This careful scrutiny is essential to ensure that the technologies are effective, reliable, and able to protect students and staff as promised.


Mike Lahiff is CEO of ZeroEyes.

NOTE: The views expressed by guest bloggers and contributors are those of the authors and do not necessarily represent the views of, and should not be attributed to, Campus Safety.

link

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © All rights reserved. | Newsphere by AF themes.