Life Science Playbook | Cushman & Wakefield

C. MANAGEMENT OPERATIONS (CONT.)

g. SECURITY AND EMERGENCY PREPAREDNESS Access Control System

The most basic element of building security is access control. Access control enables those who are authorized to enter the property access while denying access to those who do not have legitimate reason to do so. Properties may operate on: • An open access model in which any and all persons are allowed on the property without restriction or verification of identity or purpose • A closed access model in which tenants’ identities are verified prior to being granted access to the property and visitors are screened prior to being allowed to enter • A hybrid model in which some parts of the property are open to the public while other areas are open to only those with legitimate need and their identities are verified prior to being permitted entry Access can be controlled in a number of ways including establishing a perimeter around the asset that prevents unauthorized entry but with fixed entry points where tenants or occupants may be allowed to enter upon verification of their identity and where visitors can be screened prior to being permitted to enter. Similarly, access can be controlled at the lobby where tenants are permitted access to tenanted floors upon presentation of valid credentials, but visitors are required to provide proof of identity and the tenant whom they are visiting verifies that they have legitimate need to access their area(s). Finally, and especially for high-rise, multi-tenant properties, access can be controlled at the elevators, enabling appropriately credentialed tenants to activate the elevators to take them to the floors to which they have authorized access while visitors are unable to use the elevators unless screened and given a means to use the elevators. It should be noted that few access control measures are foolproof and access at each property should be carefully evaluated to ascertain whether it affords the degree of control that is required. Restricted Access In properties where access is controlled, and tenants or occupants are issued a credential, such as a key fob or access card, it is important to account for all issued access credentials on a periodic basis. Once a tenant or occupant moves out or no longer requires access to the property, their access credential should be returned to the management or security office and their access privileges removed from the access control system. This is especially important, and should be done promptly, for tenants whose employment may have been terminated may return to the building to confront, harass, or otherwise harm their former employer. Aside from controlling access for tenants, occupants, and visitors, some areas of the property must always be secured. These include engineering spaces, intermediate distribution frames (IDF), server rooms, telecommunications closets, spaces in which hazardous materials are used or stored, and spaces in which valuables are stored.

| Table of Contents

13

CUSHMAN & WAKEFIELD

Made with FlippingBook Online newsletter creator