| THE SECURITY
AUDIT its comprehensive analysis of your court's security
will assess your security problems, define your current and likely-future
security needs, and recommend a cost-effective security program. It will
propose solutions and help you decide which is best and how to achieve it.
AN AUDIT IS VITAL
when you have:
- Suspicions that explosives may
be used against your courthouse.
- Concerns that weapons are being
brought into your courthouse.
- Violent outbreaks in family or
- Delays getting prisoners to
- Strangers loitering where they
- Standing room only on traffic
days and first appearances.
- Crowded or unruly small-claims
- People you don't know bringing
suspicious packages into courtrooms.
- Cases involving street gangs or
other violent groups . . .
- The responsibility and
authority for security in your court.
- The main security threats in
and process- by-processsecurity is adequate.
and process- by-processsecurity is inadequate.
- Your liability for security
- Guidelines for adequate court
- Resources you need to establish
a reasonable level of court security:
- adding sheriff's deputies
or non-sworn security officers?
- installing weapons
detectors, courtroom alarms, video arraignments?
- changing court or
- reorganizing space use or
renovating the courthouse?
- The simplest, least-expensive,
and most effective improvements for your situation.
- Ways to reassure staff and
citizens about their safety and the integrity of court proceedings.
- Setting up an effective
LSC offers an up-to-date, fixed-price, version
of servicessecurity (and facility) auditsthat have been assisting
courts across the country for twenty-five years. Your audit will be conducted
by an experienced and reliable security consultant and will emphasize an on-
site assessment of your court security problems.
INCLUDES: an on-site survey lasting up to one weekclosing
with an exit briefing and followed by a written report about two weeks
later. The report spells out your problems and needs, describes and evaluates
the significant choices, and recommends a phased program of steps you can take
to realize security improvements.