Using QATT Technology
Having the proven and effective technology to prevent terrorism before it happens is a key to deterring threats and mitigating risks. Self-storage owners and customers now have access to Qualified Anti-Terrorism Technology (QATT), that which is designed, developed, modified or procured for preventing, detecting, identifying or deterring acts of terrorism, or limiting the harm such acts might cause.
According to the Homeland Security and Defense Business Council, a company that implements technology designated or certified per the SAFETY Act has the right to seek immediate dismissal of civil claims if sued following an act of terrorism. It has the same right if sued for property or personal injury damages caused by failure of QATT.
Following is a breakdown of some SAFETY Act-approved security options available to maximize a self-storage facility’s safety and security.
Third-Party Video Surveillance
This is one of the most impactful ways of catching criminals in the act while protecting against loss or property damage. The advancement of high-speed, broadband technology allows real-time surveillance through the Internet or “cloud computing,” at low cost of ownership. It allows third-party security providers to watch network-enabled cameras from a remote location without being seen or heard by trespassers.
Remote surveillance also gives vandals the impression they’ve penetrated your security without notice while first responders (on-site managers, police, etc.) have already received a call and been dispatched. Real-time, off-site video surveillance allows for live visual verification, the elimination of false alarms, and escalated response priorities.
Depending on your surveillance needs, a third-party monitoring service is like a “virtual guard” watching over your facility. Intervention specialists are paid to watch cameras and respond immediately to suspicious activity. Unlike self-storage managers, they have no interruptions from customers or other distractions, eliminating gaps in video monitoring.
Most third-party surveillance services provide direct access and time-stamped video snapshots of live events, which can be e-mailed to first responders while malicious or suspicious events unfold. This outweighs the post-event video-retrieval process that can be lengthy and cumbersome.
Additionally, intervention specialists don't rely on a triggered alarm to alert police that criminal activity is in progress; they give a proactive vs. after-the-fact response. The human intervention behind the technology makes the difference.