Fight bullying and abuse with a security vulnerability
When bullying or abuse occurs, it can have an adverse impact on your organization’s core belief of providing a safe place to learn and grow. Assessing your security and supervision policies will help identify areas that may need additional resources, such as increased supervision or monitoring to control unacceptable behaviors that lead to bullying and abuse allegations.
The National Fire Prevention Agency's NFPA 730 – Guide to Premise Security offers guidelines for a security vulnerability assessment (SVA). An SVA assesses the current status of an organization's vulnerabilities, including threat exposures, security features, and preparedness.
A security vulnerability assessment should include, but not be limited to, the following steps:
Formation of a team.Form a team of personnel from pertinent organizational areas and other stakeholders. This can include local staff, key members of related organizations, representatives from your community, and your insurance carrier, for example.
Organization/facility characterization.This includes identification of assets, operations, policies, environment, crime statistics, current site safety measures, and more. Simply put, you are protecting your organization and potentially your reputation.
Threat assessment.Classify threats using an assessment process that includes, but is not limited to, the following:
- Classification of critical assets. What resources do you have to support an anti-bullying and-abuse program?
- Identification of potential targets. Are there any children who might be potential targets for bullying and abuse due to the age, size, gender, sexual orientation, or athletic ability?
- Consequence analysis. What impact will an event have on your organization?
- Definition of potential threats. What might a potential bully or abuser look like in your community?
Threat vulnerability analysis.Review prior allegations of abuse and consult with other organizations about what they have experienced. Do potential scenarios exist that make your organization vulnerable to an event, and what actions are in place to prevent them from occurring?
Define specific security countermeasures.Define proactive actions you can take using the information from the previous four steps to support your bullying and abuse prevention policies.
Assess risk reduction.Review your policies to determine what is working and what is not. Implement additional security risk reduction measures, as appropriate.
Document findings and track implementation.As with any quality process, document findings and recommendations, and track the implementation of accepted recommendations.
The information provided in this article is intended for general informational purposes only and should not be considered as all encompassing, or suitable for all situations, conditions, and environments. Please contact us at email@example.com or your attorney if you have any questions. The article may not be linked to, copied, reproduced, republished, posted, or distributed in any way by non-policyholders of Markel®, without permission.