Church Safety, Security, and Emergency Procedures (part 4 of 5)

TFE3QMW4XY

Emergency Procedures

In the event of a building emergency or natural disaster, having clear emergency procedures in place adds a layer of security to an organization and peace of mind to its members.

  • Outside evacuation (in case of fire, gas leak, etc.)
  1. Children’s teachers escort all students to a parking lot (take roll with them to make sure all are present).
  2. Hall monitors help get non-verbal children to a parking lot.
  3. Ushers escort worshippers to a parking lot.
  4. All teachers and workers/volunteers work to get people outside.
  5. Designated person(s) must go through the building to confirm evacuation.

 

  • Inside evacuation (in case of tornado, lockdown, etc.)
  1. Children’s teachers escort all children to an inside, lower-level hallway (take roll with them to make sure all are present).
  2. Hall monitors help get non-verbal children to an inside, lower-level hallway.
  3. Ushers escort worshippers to large room such as a fellowship hall.
  4. All teachers and workers/volunteers work to get people to an inside, lower-level hallway.
  5. Designated person(s) must go through the building to confirm evacuation.

 

Lead On!

Steve

Church Safety, Security, and Emergency Procedures (part 3 of 5)

8T9Y244TK8

Security

Security should exist in several layers, and it involves personnel. Consistent people acting in consistent ways and using consistent procedures builds trust and security within an organization.

  • Innermost layer: Teachers in each classroom should be there on a regular basis and should know the children personally. They should also know which parents are allowed to pick up which children. Teachers should also be trained in security procedures such as what to do if a child is lost or taken by an unauthorized person.
  • Interior layer: Hall monitors (two per hall) should be present to forbid unauthorized persons from walking through hallways in the children’s/youth areas. Only parents, teachers, and children should be allowed in these areas. Hallways in these areas should not be used as cut-throughs to other areas. Hall monitors are also helpful in fetching supplies for teachers, summoning parents, etc. Their primary responsibility is to be visible as monitors. They should wear name tags to label them clearly.
  • Perimeter layer: If a church can afford to hire a police officer to direct traffic at the main entrance, the officer can be a part of the church’s safety and security system. He/she can act if necessary when/if there is a breach of security requiring action (if a child were abducted, the hall monitor or teacher could potentially notify the officer before the offender leaves the church property). A hired officer can also summon backup quickly from other police officers if it becomes necessary. The church should have a check-in system at the main welcome desk/area in order to document which safety officer, doctor, nurse, etc. is “on duty” each Sunday. Mobile numbers need to be readily accessible for these people to ensure a quick response from them when needs arise.
  • Comprehensive layer: Every church should implement a Safety Officer Team whose primary function is to protect people in worship services. The team is a great way to give volunteer opportunities, especially to members trained in safety and security (current or former police officers, security guards, etc.). At least one member of the team should be present at each worship service. Offenders who seek to harm individuals often desire notoriety, and a potential attack on platform personnel (particularly the Senior Pastor) is a way to gain that notoriety.

 

Lead On!

Steve

 

Church Safety, Security, and Emergency Procedures (part 2 of 5)

Safety

Safety measures are most effective when several layers exist (overlapping systems which support each other). Note: Using the term “safety” more often than the word “security” is wise, because “safety” has a positive connotation; “security” has the potential to imply a threat.

 

Suggested “layers” or systems for safety can include:

  • Use biometrics (fingerprint) check-in systems at stations for all children ages birth through fifth grade (preschool and elementary areas). Alternatives like bar-codes or cards can be used, but those are easily forgotten or left at home (not as consistently secure). These systems using bio-metrics can use a parent’s fingerprint to generate a paper stub containing a lot of information pertinent to the child (information initially entered by the parent or a staff member). The church can configure the information according to its needs. Once check-in stations are active, the stub system should be mandatory and used every time preschoolers and children go to their classes for programming.
  • Use a beeper/buzzer system for all pre-verbal children (usually birth through age two) to allow parents to be summoned quickly if necessary. Beepers are personal, private, and easy for a parent to hear/see in order to respond. These can also be helpful for older children with special needs who may have communication issues.

NOTE: Investigate smartphone options/apps which might address some or all of these needs. This technology is rapidly developing and should be regularly considered in light of the new options available.

  • Install safety cameras to monitor all hallways and exit doors, angled to view people as they leave the church/area. Do not draw attention to them; people who potentially seek to do harm will notice their presence. Average churchgoers might be alarmed or perceive danger if you raise their awareness.

 

Lead On!

Steve

 

Church Safety, Security, and Emergency Procedures (part 1 of 5)

EN7AWY4OEB

Safety and security policies are critical in the church. Establishing and following these procedures will:

  • Take steps toward protecting people (especially children) from people intending to do harm to others,
  • Take preventative steps toward protecting people from a natural disaster or event with the potential to cause harm, and
  • Help protect the church from potential litigation stemming from incidents in which these procedures are necessary (without such a policy, the church is more vulnerable).
  • Unify members and staff in an effort to promote, practice, and provide funding for procedures that ensure peace of mind for all members and guests.

 

Lead On!

Steve

 

Church Custodial Management (part 10 of 10)

Custodian and Administrator Responsibilities

HJAYJG4OLY

  • Custodians have these primary responsibilities
    • Room setup and teardown
    • Cleanliness
    • Maintenance
    • Security
  • Administrators are responsible for the work done (or not done) by the custodian(s).
    • If a custodian is not meeting expectations, the administrator must take action in the form of a meeting or disciplinary consequences.
    • Before taking disciplinary action, it is important to learn the reasons for the poor performance. Sometimes a personal matter can make it hard for an employee to focus. The administrator might be able to help with the personal matter and thus retain a good employee.
    • If the custodian is just not able to do his or her job, release the employee ASAP. Be as generous as you can with a severance package and recommit yourself to hiring well on the next custodian.
  • Administrators are responsible for the morale of the custodians too. A couple of times a year, do something “fun” such as buying them pizza for lunch or hosting a game of pool.
  • Custodians are people but too many times they are seen as tools; treat them as people, not utensils.

 

Lead On!

Steve

 

 

Church Custodial Management (part 9 of 10)

Create spreadsheets (part 2 of 2)

O6ZKFPOHXN

 

  • Create whatever spreadsheets help you. Below is a list of some that many administrators find useful:
    • Room setups – this spreadsheet should list all rooms in rows, and the columns should have titles for the weekly or monthly regular meetings, the normal setup style, how long it takes to do the regular setup and teardown, and other info.
    • Room cleaning – this spreadsheet will list all rooms in the entire facility and how long it takes to clean each room on a weekly basis (vacuum, empty trash, wash boards, etc.) and then how long it takes to give the room a deeper cleaning of the room on a quarterly or semi-annual basis (thorough floor cleaning, washing windows, etc.).
    • Vendors – this lists all the companies that provide services and products for the building and grounds. It also lists what each company does, the contact people, their phone numbers, emails, and other ways to reach key people.
    • Floor plans – make several copies of your floor plans and then on each copy, mark the location of the following items:
      • Fire
        • Main Fire Panel
        • Fire Pull Stations
        • Visual Alarms (strobe lights)
        • Smoke Detectors
        • Heat Detectors
        • Fire Extinguisher locations
        • Riser closet (for sprinkler system)
        • External pressure pump for sprinkler system)
      • Water cutoff valves and what they cut off
      • Electrical
        • Electrical panels
        • Main breakers
      • Security
        • Camera recording computer
        • Camera locations
        • Motion detector sensors
        • Angle and distance of motion sensor throws
      • HVAC
        • Equipment locations
        • Thermostat locations
        • Equipment make, model, description, and condition
      • Other lists
        • Key log
        • Capital Needs List
        • Normal HVAC Schedule
        • List of roof replacements
        • List of areas & rooms painted and when
        • List of areas & rooms with new flooring and when
      • Give copies of these electronic files to key people. Update these files as often as information changes. These are “living” docs and should not be shelved; use them regularly.

 

Lead On!

Steve

 

Church Custodial Management (part 8 of 10)

2014 12-December 27 (2164) Barcelona; Nave of the Sagrada Familia with windows over entrances

Create spreadsheets (part 1 of 2)

  • Make a series of continually updated documents which contain a wealth of information and which are tools for the administrator, administrative assistants, and custodians.
  • The cleaning and room setup and teardown spreadsheets will list the amount of time it takes to do a specific task.
    • This information can be used to determine how many custodians you need on a regular basis. I suggest planning to use about 85-90% of a custodian’s time for the regular items and leave about 10-15% for special setups or unforeseen events.
    • This data can be used in performance evaluations of the custodians.
    • This data is also helpful in explaining to committees why the church needs the number of custodians it does.

 

Lead On!

Steve

 

Church Custodial Management (part 7 of 10)

Create room layout templates to be used with room requests

  • Have a graphic designer create a page with various room setups, and label each setup.
  • That page should be available online and in the office so that anyone who asks for a room can also select the appropriate arrangement of tables and chairs to meet their needs.
  • The size of the layout will be determined by the number of people attending the event (which should also be a question in the online room request form), so the custodians can work their magic in getting the right number of tables and chairs to match the chosen layout.
  • Some of the various layout options are:
    • Solid square
    • Open square
    • U-shape
    • Lecture style with tables
    • Lecture style with just chairs
    • Circle
    • No chairs or tables

 

Lead On!

Steve