How to Use the Checklist
The Checklist is best completed by the individual or individuals with highest familiarity with the school’s security practices. In many cases, this will require a team approach to completing the Checklist.
A Layered and Tiered Approach
The Checklist, like the PASS Guidelines, approaches school security at five different layers of protection.
The Guidelines and the Checklist recognize different tiers of security - from basic security to more comprehensive approaches. Each tier within the Checklist and within the overall PASS Guidelines includes all recommendations in the preceding tiers, and in most cases, implementation of best practices at the lower tier level lays the groundwork for moving to higher levels of security in the long term.
DISCLAIMER: The Safety and Security Guidelines for K‑12 Schools (the “Guidelines”) are provided for informational purposes only. Under no circumstances do the contributors to this document and the organizations participating in the Partner Alliance for Safer Schools (PASS) provide any related guarantees or accept liability for any loss or damage resulting from any person acting or refraining from acting on this information. The Guidelines are not a substitute for legal, financial, or other professional advice to address the specific facts and circumstances related to the implementation of a particular school safety or security measure or program.
PRIVACY NOTICE: PASS and the contributors to this document do not collect, store, or process any personal or sensitive information through the distribution of these Guidelines. Individuals and organizations accessing or sharing this document online should be aware that digital platforms, websites, or third‑party services may collect data in accordance with their own privacy policies. PASS is not responsible for the security, privacy practices, or data‑handling activities of any external websites, cloud services, or online platforms used to obtain or distribute the Guidelines. Users should exercise caution and follow their organization’s data governance and cybersecurity practices when accessing or disseminating this information online.
DATA PROTECTION STATEMENT: While reasonable administrative, technical, and physical safeguards are commonly used by reputable online platforms to help protect data from unauthorized access, disclosure, alteration, or misuse, no system can guarantee absolute security. Users are encouraged to review the privacy and security policies of any website or service they use to access the Guidelines to ensure that appropriate protections are in place.
