Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Gain access or entry: Commercial or industrial sites with security features

Control Measure Knowledge

The type of building construction and the security features present should be assessed. If possible, to assist with gaining access, contact should be made with the responsible person and a review of risk information carried out to establish if access or egress may be affected by security features.

This information will assist with selecting the most appropriate entry point, equipment and techniques for the situation, which can save time and prevent the need for unnecessary damage.

Depending on the type of commercial or industrial secure site, the following methods of access may be appropriate:

  • Gaining access via codes or keys, which may require the assistance of a responsible person or a security company
  • Disabling the security features, which if not done with the assistance of a responsible person, should be tested before personnel gain access
  • Entering by force

The fire and rescue service may be able to gain access via codes or keys for sites with security features.

In the absence of a responsible person, it may be necessary to test the disabling of security features before gaining access.

If it is not possible to deactivate security features, it may be necessary to gain access or entry by force (sometimes referred to as forced entry or forcible entry). Before doing so, the impact of this entry on any hazards present should be considered.

Personnel should follow agreed methods for maintaining access and egress to ensure that routes are not compromised and to prevent personnel becoming isolated. Methods may include:

  • Disabling security features
  • Keeping doors open by using dead bolts or specialist equipment
  • Positioning personnel to manage doors or security features

As some types of roller shutters may retract suddenly when damaged, such as during a forced entry, personnel should be made aware that this may happen and the hazards that these may present.

Security smoke (sometimes called security fog or smoke screen) is thermally generated white smoke used as a security measure. As security smoke machines may use glycol or glycerine mixed with distilled water to produce a dense white fog that obscures vision, personnel should be made aware of this hazard. It may have a potential impact on navigation and as a precaution personnel should wear appropriate respiratory protective equipment (RPE).

If guard dogs protect the secure site, it may be necessary to seek assistance from specialist animal handlers.

Where there are armed guards, fire and rescue service activity should always be carried out under escort and in accordance with pre-determined arrangements.

It may be beneficial to record any relevant information about commercial or industrial sites with security features in Location Notices. It may be useful to carry out joint on-site training to identify and understand security features of high-risk sites.

Strategic Actions

Tactical Actions