• Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map

Phone:985-875-0119

Consultants@sds-web.net
Security Design Solutions LLC Security Design Solutions LLC Security Design Solutions LLC Security Design Solutions LLC

Protect your business from loss and liability!
SERVING CLIENTS SINCE 1998

  • Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map

I Need Help!

Home Uncategorized I Need Help!

I Need Help!

Jan 15, 2021 | Posted by Michael Khairallah | Uncategorized |

Private security generally takes a proactive approach, the objectives are to deter, detect and delay unwanted human activity.  But sometimes the perpetrator avoids or overcomes all measures to prevent their actions and now security must respond to a potential incident that is already underway.

The worst case is when the perpetrator has confronted a protected employee or authorized visitor and that person now needs help.  Unfortunately if the employee attempts to call security or request help in an overt way, the perpetrator may become more aggressive and hostile and might injure the employee.  This problem is often solved by using a discrete panic alarm.

A panic alarm is a simple device that covertly signals security of an existing and imminent threat and help is needed.  It is often a pushbutton located in a convenient place concealed from view that is connected to visual and / or audible device that alerts the security staff of the threat.  In more sophisticated systems where guards are roving, that signal appears on a radio or pager like device; the configuration depends entirely on the situation.

However, the signal is just the start of the process, how security responds is most important.  Because the circumstance for the signal is unknown security must respond quickly but with the utmost discretion to avoid further exciting the perpetrator and causing them to act out.  The protocol for their response should be thought out in advance as much as possible and the employees should be informed so they will know what to expect and, if possible aid security in their efforts.

Panic alarms may be used at all points of public contact but especially at the first point of contact such as a reception desk.  Threat may also occur in private rooms such as interview or exam rooms where there is a possibility that the subject may become hostile.  We have even seen a case in a hospital that served violent communities where a patient was undergoing an injury examination when the individual who caused the injury came in the room to again confront the patient.

When doing a security assessment consider that your preventive measures may fail to stop the perpetrator and those you are assigned to protect may be in peril and need help.  Consider adding panic buttons as part of your response methods.

0
Share

About Michael Khairallah

Michael is a physical security systems consultant providing services to clients throughout the United States. Michael entered the security industry in 1980 as a Manufacturer’s Representative for Cardkey Systems then founded Card Access Systems where he served as President and CEO for 17 years. He became an Independent Physical Security Systems Consultant in 1998 and provides all the elements of risk assessment and mitigation for his clients.

Find us on Facebook

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
Contact SDS for your assessment today Contact

Contact SDS for your system implementation today.

Louisiana Security Consultant LA-Consultants@sds-web.net
U.S. Security Consultant US-Consultants@sds-web.net
International Security Consultant International-Consultants@sds-web.net

Telephone 985-875-0119

© 2025 · Security Design Solutions LLC

  • Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map
Prev Next