1 FY02 ASA Presentation PROVIDE CRIME PREVENTION AND ACCESS CONTROL SERVICES Presented by: Harold Dawkins List Presenters Office of Research Services National.

Slides:



Advertisements
Similar presentations
MONITORING OF SUBGRANTEES
Advertisements

St. Louis Public Schools Human Resources Support for District Improvement Initiatives (Note: The bullets beneath each initiative indicate actions taken.
MSCG Training for Project Officers and Consultants: Project Officer and Consultant Roles in Supporting Successful Onsite Technical Assistance Visits.
Emergency Preparedness and Response
Using the Self Service BMC Helpdesk
SECAM Systems Product Presentation SECAM Systems © 2010.
Logistics Customer Satisfaction Survey Results FY 2007 Logistics FY 2007 Customer Satisfaction.
Safety and Health Management Program
Cleveland School District Gerald Finley, Property Manager Friday, July 27, 2012.
Auditing Computer Systems
1 FY 2004 Performance Management Plan Presentation Conduct Fire Prevention Services Team Members: J. P. McCabe, P.E. Fire Marshal, DFM, ORS Samuel A. Denny,
Prepared by: Beatrice Powell April 2012 Modified by: Sue Dawson September 2012.
Incident Command System Basic Course
Streamlining the Journal Process June 21, 2006 Presentation to Financial Unit Liaisons.
Center for Health Care Quality Licensing & Certification Program Evaluation 1 August 2014 rev.
Laboratory Management - 1
Summary Maximo is an Enterprise Asset Management System used by Cornell University Facilities Services. Many of Cornell's physical assets found across.
Your Community's Volunteer Reception Center. Goals a.Attract local volunteers willing to respond following a local disaster by managing a VRC b.Guide.
1 Performance Management Presentation Access Control Team Members: Major Billy Alford, Team Leader Bill Brosius, Alex Salah, Cassandra Harris ORS National.
Welcome to CMPE003 Personal Computer Concepts: Hardware and Software Winter 2003 UC Santa Cruz Instructor: Guy Cox.
1 Performance Management Presentation Team Members: Ken Ryland and Marianne Bachmann, Hugh Malek, Karla Terney, Alice Hardy, Joseph Kristofik, Dan Shoen.
Cougar Scheduler and Logistic Services One-Stop Shop For Services, Equipment & Staff Cougar Kickoff Bike Ride Welcome Back Picnic 2010.
Change Advisory Board COIN v1.ppt Change Advisory Board ITIL COIN June 20, 2007.
Preliminary Assessment Tribal Emergency Response Preparedness Dean S. Seneca, MPH, MCURP Agency for Toxic Substances and Disease Registry Centers for Disease.
HCL CONFIDENTIAL 1 Smart Engineer Review Date: 12 th July, 2005.
POD PLANNING GUIDE. INTRODUCTION This guide is intended to be a simplified step-by- step guide through the process of planning a Point of Dispensing (POD)
Component 10 – Fundamentals of Workflow Process Analysis and Redesign Unit 10 – Process Change Implementation and Evaluation This material was developed.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
FY02 ASA Presentation Provide Scientific Equipment Services Presented by: Johnny Robbins (Team Leader) Team Members: Annalie Burke John Baron John Olguin.
Chapter 11 Presentation Systems Implementation, Operation, and Control Computer System.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Provide Facility Management and Maintenance Services 1 FY02 ASA Presentation Provide Facility Management and Maintenance Services Presented by: Kelvin.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Information Systems Security Operational Control for Information Security.
1 FY02 ASA Presentation Fire Prevention Section, EMB, DPS Presented by: J.P. McCabe, P.E. Samuel A. Denny, P.E. Robert C. Beller, P.E. Office of Research.
1 FY02 ASA Presentation Basic Life Support for Animal Research Animals Presented by: Eileen Morgan Chief, Facility Management Branch Charmaine Foltz Chief,
1 FY02 ASA Presentation “Provide Space Planning to Support IC Programs” Presented by: Gerald W. Hines (team leader) Cyrena Simons Joan Swaney Camelia Smith.
1 FY’02 ASA Presentation Occupational Medical Service, DS “Medical Care in a Timely Fashion” Presented by: James Schmitt Team Members: Alpha Bailey James.
Guest Cycle A division of the flow of business through a hotel that identifies the physical contacts and financial exchanges between guests and hotel employees.
1 CONDUCT FACILITY ASSESSMENTS Customer Value Proposition Leverage our expertise and background in NIH scientific infrastructure needs by providing state.
Client Recordkeeping.  Service Agreements  Safety Partnership Letters  Hold Harmless Agreements  Worksite Evaluations  Follow-up Worksite Evaluations.
Alliance Texas Small Business Fair GSA, PBS Fort Worth, TX June 26 th, 2008.
1 Performance Management Report Service Group: Provide Security Guard Services Team Leader: Major Patricia Haynes Team Members: Lawrence Brown Marco Kittrell.
1 FY02 ASA Presentation Provide Administrative Support (2) Presented by: Genia Bohrer Office of Research Services National Institutes of Health 18 November.
1 FY02/FY03/FY04 Evaluation Summary Security and Emergency Response Program Division of Fire Rescue Services “NIH Fire Department”
System Implementation
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Stages in the Guest Cycle
1 FY03 PMP Presentation Package Security and Emergency Response Program Division of Fire Rescue Services “NIH Fire Department”
Disaster Planning Workshop Hosted By: Pleasantview Fire Protection District.
AUDIT OF INTERNAL CONTROL Day V Sessions I & II. Session Overview Periodical audit of existence of internal control in order to examine its effectiveness.
ARCHITECTURE ENGINEERING COMMUNICATIONS TECHNOLOGY AVIATION | CIVIL | CONSTRUCTION SERVICES | DATA SYSTEMS | ENVIRONMENTAL FACILITIES ENGINEERING | GEOSPATIAL.
Fundamentals of Workflow Analysis and Process Redesign Unit Process Change Implementation and Evaluation.
ALANA WILLIAMS WHAT IS REVENUE CYCLE MANAGEMENT?
Community Emergency Response Team
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
State of Georgia Release Management Training
DHHS COE Meeting Agenda February 16, 2011 Welcome Introductions Contract Compliance Reporting Questions and Answers DHHS Open Windows Update Group Exercise.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
FY02 ASA Presentation Provide Workplace Safety Presented by: Deborah E. Wilson, DrPH, SM, CBSP Occupational Safety & Health Branch Division of Safety,
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Principles of Information Systems Eighth Edition
Incident Reporting And Investigation Program
Team Leader: Major Patricia Haynes Team Members: Lawrence Brown
Incident Reporting And Investigation Program
County HIPAA Review All Rights Reserved 2002.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Property Control Asset Forms
Presentation transcript:

1 FY02 ASA Presentation PROVIDE CRIME PREVENTION AND ACCESS CONTROL SERVICES Presented by: Harold Dawkins List Presenters Office of Research Services National Institutes of Health 18 November 2002

2 Main Presentation ASA Template ……………………………….……………………………….4 Customer Perspective……………………….……………………………….5 Customer Segmentation …………………….…………………………………6-8 Customer Satisfaction……………………….…………………………………….9 Internal Business Process Perspective……………………………………10 Service Group Block Diagram…………………………………………………..,11 Conclusions from Discrete Services Deployment Flowcharts……………12-13 Process Measures…………………………………………………………… Learning and Growth Perspective………………………………………….16 Conclusions from Turnover, Sick Leave, Awards, EEO/ER/ADR Data……..17 Analysis of Readiness Conclusions…………………………………………….18 Conclusions and Recommendations………………………………………19 Conclusions from FY02 ASA..………………………………………………… 20 Recommendations……………………………………………………………21-22

3 Table of Contents Appendices Page 2 of your ASA Template Customer segments graphs Process measures graphs Process maps Learning and Growth graphs Analysis of Readiness Information Asset utilization graphs

4

5 Customer Perspective

6 DS1 and DS 2: Building Entry Systems. Our customers are everyone in the NIH community who depend on access control systems. We are currently converting to the Andover system, which is a proximity card reader system that is more sophisticated, and provides more security than the previous system used. As of now: We have converted 98% of cardkey readers on perimeter doors to the Andover system. 80% of campus interior and animal doors completed. Leased space perimeter conversion is being phased in. DS 3: Locksmith services. The distribution of trouble calls and installations for the locksmith does not show an effect. ORS has submitted as many work requests/orders for locksmith service as the Clinical Center. The remainder of the Locksmith’s work is equally distributed amongst the Institutes with the exception of NCI. Customer Segmentation I

7 Customer Segmentation II DS 4: ID Badges. ID system statistics give us accurate insight into the makeup of the NIH population. 43% of the badges issued under the new ID system have been issued to non-FTE employees. Contractors make up about 22% of the total. (See chart on page 8). DS 5: Consult on crime prevention: ORS, NIAMS and NIDCR were our biggest customers for crime prevention consultation, presentations, and follow-ups on reports of theft. DS 6: Community Policing. Since 9/11, community policing has been on hold because we are lacking a sufficient number of officers to provide both heightened security and community policing services. DS 7: Provide security for special events. Our primary customers are everyone who plans and stages special events. All approved events are channeled through us for security analysis. About 80% of all special events involve 50 or more attendees.

8 Customer Segmentation DS4: Issue and Manage ID cards

9 We did not survey customers this year However, in 2003 we plan to survey as follows: DS-1 and DS-2: A/Os who interface with building entry systems DS-3: A/Os who request installations, and/or modifications DES project officers who request advice, and /or consultation Individuals requiring service on an emergency basis DS-4: A/Os and delegates who interact with ID Card system DS-5: A/Os, facility managers, Project Officers DS-6: Facility managers DS-7: Event coordinators Customer Satisfaction

10 Internal Business Process Perspective

11 Service Group Block Diagram “A COMBINED EFFORT’ All of the activities fit together in a proactive approach to prevent crime. The effectiveness of each discrete service is dependent upon each other.

12 Our Service Group completed 7 deployment flowcharts for 7 discrete services DS 1: Develop a centralized point for receiving work orders/requests for additions to the access control system. As reflected in the flow chart there is a prolonged process in receiving and processing requests. A centralized point for receiving and processing would expedite this service. DS 3: The efficiency of the locksmith service can be improved by establishing a means to transfer information onto a “Computerized Signature Card.” This improvement will serve to enhance the overall process. DS 4: In the current process for issuing employees IDs, an employee decides whether the individual is an employee or a contractor and issues the appropriate ID. However, the system already “knows” whether the individual is an employee or a contractor. We are modifying the system so that it automatically assigns the proper ID for the individual. This should save time and improve accuracy. Conclusions from Discrete Services Deployment Flowcharts

13 DS 5: The prevention process depends on the active participation, involvement,and communication of all components involved. This contributes the overall prevention of security breaches, and an effective recommendation and implementation process. DS 7: The security of the events process relies on open communication/participation of all parties involved to comply with security requirements in order to ensure the success of this process. Conclusions from Discrete Services Deployment Flowcharts

14 Process Measures: DS1: System malfunctions before/after installation of new equipment. DS3: Total number of requests for emergency service. DS5: Crime rates before/after crime watch presentation. DS7: Total time invested on the coordination of special events process.

15 Findings from process measures data: DS1: Data on system malfunctions do not discriminate between system problems and mechanical problems, therefore there is no data to support process measures for system malfunctions before/after installation of new equipment. DS3: All emergency calls are stable at approximately 100 per month. However, because the total workload for the locksmiths has increased significantly while staff has decreased. We know that non-emergency response time is increasing. We expect to document this in DS5: To determine the effect of our presentations, consultations etc., we need to measure crime rates before and after we work with the IC “clients.” Because heightened security after 9/11 reduced the incidence of crime at NIH dramatically, we will use FY 2002 as a baseline year and measure “before and after” crime rates beginning with DS7: In providing security for special events, only 21% of our time is spent in actually attending the events. The other 79% is spent in planning and coordination.. We’ve included in the Appendix a detailed description of some of these steps for a particular event.

16 Learning and Growth Perspective

17 Our data does not reflect any significant issues. Conclusions from Turnover, Sick Leave, Awards, EEO/ER/ADR Data

18 To maintain a tactical and technical edge on those who mean NIH harm, we will need to keep up with rapidly changing security, loss prevention and crime prevention techniques, and we will need continually to invest in new equipment and systems as technology evolves. Because of growth in the locksmith workload, we will need at least 2 additional FTEs by We will also need an additional FTE in Facility Access Control. Also 2 additional FTEs in the crime prevention unit due to the expected increase in responsibilities involving the addition of the CC, construction of a bio-defense facility, expanded security oversight of the Fort Detrick site, and other out of state NIH facilities. Enhancement of computer software with data management capabilities in order to provide a more efficient means of documenting relevant statistical data. Analysis of Readiness Conclusions

19 Conclusions and Recommendations

20 Conclusions from FY02 ASA While our service group encompasses several separate organizational units, we do make up a meaningful service group. We provide a combination of service that requires us to work together and depend on one another to help protect the NIH community. There is no centralized point for receipt of work orders/requests for additions to the access control system. We are understaffed in the locksmith’s branch for the amount of required work/requests.

21 Recommendations -I Because of security control limitations at multi-tenant facilities (see process map 1a), we recommend that NIH re-evaluate future multi-tenant leases wherever possible to ensure additional security control flexibility. Develop security requirements to include/enhance all on and off campus building perimeter access points. Create additional reporting capabilities for the Andover System that are more user friendly, and simplify system malfunctions, employee errors, security breaches, etc., Improve the operation of the interface between the NIH Enterprise Directory (NED) and the Andover Continuum access control system to prevent problems that occur when downloading employee badge information. In year 2003, the locksmith branch should have the capability of tracking response time for non-emergency calls..

22 Recommendations - II Primarily, because of the security mandates following the events of 9/11, the NIH community should be educated regarding the special events process from approval/request for service to providing security for service. Non FTEs need security clearances prior to the issuance of an identification card due to the implementation of the current Andover proximity card reader system. Because of the current chaos in access control policies and procedures (see Process Map 1a) we recommend the creation of an “Access Control Unit” responsible for developing and implementing access control policies and procedures.

23 Appendices

24 Appendices Include the following: Page 2 of your ASA Template Customer segments graphs Customer satisfaction graphs Block diagram Process maps Process measure graphs Learning and Growth graphs Analysis of Readiness Information Unit cost graphs Asset utilization graphs Any unique measures graphs

25

26 Customer Segmentation DS1: Install & Maintain Building Entry and Security Systems Completed Conversions from Cardkey to Andover Interior 72 Card Reader 412 FDA 19 Off Campus 65 Animal 68 Converted 98% of cardkey readers on Perimeter doors. Lease space perimeter conversion is being phased in. Campus interior and animal doors are 80% complete.

27 Customer Segmentation DS3: Provide Locksmith Services.

28 Customer Segmentation

29 Customer Segmentation

30 DS7: Coordinate and Provide Security for Events Customer Segmentation

31 Process Measure Graphs

32 Process Measure Graphs DS3: Provide Locksmith Services * Jan to Sept.

33 Process Measure Graphs DS3: Provide Locksmith Services

34 Process Measures Graphs DS3: Provide Locksmith Services

35 Ratio of 4 to1 for time spent planning events compared to time spent at events. n 1914 Total hours spent on Events Hours spent for planning & coordinating (79%). 396 Hours spent attending events (21%) DS7: Coordinate and Provide Security for Events

36 PLANNING AND COORDINATING SECURITY FOR SPECIAL EVENTS ON THE NIH CAMPUS: Meet with event sponsors and establish a liaison Inform Police Managers of the event Establish personnel requirements and any other additional needs of the department Arrange for cost reimbursement from institutes Obtain a list of attendees/participants Develop a Security Plan Contact the building events management staff where the event is being held FINDI N GS FROM PROCESS MEASURES DATA FROM DS7:

37 If dignitaries are attending, contact and coordinate with their protection details Notify the fire department and fire prevention personnel Make arrangements to ensure all vehicles coming onto campus are inspected Make parking arrangements for all vehicles associated with the event. Provide sufficient area for the news media Ensure that there is sufficient signage on campus so that employees are aware of any road closures, detours, etc., due to the event. Some events require in-depth planning. Such an event was the two day Menopausal Hormone Therapy Conference that occurred during the month of October In addition to Secretary Tommy Thompson, there were 15 dignitaries, 50 speakers, and one thousand attendees expected. We worked closely with the building 45 events coordinator and management staff. Arrangements for various media staff were made. We also made special arrangements for special guests and handicapped personnel. FINDI N GS FROM PROCESS MEASURES DATA FROM DS7:

38 Since the Secretary was attending, we coordinated with his protection detail to ensure his safety. In addition, we put additional security measures in place to ensure the safety of all visiting persons. We had a contingency plan for any emergency that may arise. The K-9 explosive team was deployed to the Natcher Building to conduct a security sweep prior to the start of the event. Once the building was swept, it was secured by designated security personnel. Police officers were assigned various posts within the building. Some officers were roving, and others were posted outside the building. All vehicles entering the campus were inspected, including the non-NIH buses transporting persons to the event. No vehicle were allowed on campus without being inspected. K-9 officers searched the vehicles of special guests that were cleared to parked directly in front of the Nathcer Building. Due to the overall sensitivity of the event, there were concerns for any attempts to disrupt the conference. The Intelligence Branch of the NIH Police Department conducted a briefing in order to dispense all relevant information available regarding disruptive groups. FINDI N GS FROM PROCESS MEASURES DATA FROM DS7:

39 Process Maps

40

41 DS1b. Maintain Building Entry and Security Systems Date: 11/4/02Participants:ASA Team ISR (Contractor) Automated Systems Unit Police 911General CampusSystem Generates trouble message Initiate trouble call Respond Is it warranty issue? Repair Analyze problem Hardware? Repair Yes Handle any police issue Yes No

42 DS 2: Operate and Maintain Building Entry and Security Systems Date: 11/4/02 Participants:ASA Team Facility Access Control PoliceIC A/O Determines need for access Is information on the individual in NED System? Inputs information Does individual have ID Card? to DS 4 Yes Is individual an employee? Send requestfor access to Facility Access Control Yes From DS 4 No Request NCIC check No Check NCIC OK?Deny requestNo Send to requestor and Facility Access Control to grant request Yes record Notify requestor by Modify electronic record

43

44

45

46

47