a security survey for houses of worship...willingly acknowledge that every facility cannot do...

18
Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015 1 A SECURITY SURVEY FOR HOUSES OF WORSHIP A Supplemental Design Instrument for Crime Prevention for Houses of Worship By Paula L. Ratliff Published by the ASIS International 2015. Every place of worship is different in size and design. Some places of worship may be a single building with a few attendees. Other places may contain multiple buildings and entrances with thousands attending services and events every day from morning to night with activities for all ages. The design and purpose may be as different as the theology and philosophy taught inside. Therefore, a security program must be uniquely designed for your facility, placing equal priorities on the safety of people, programs, property, and preparedness for emergencies. The level of security will oſten be determined by financial and personnel resources; yet, it is imperative that you do something to protect those who worship with you. As you begin to evaluate your property, keep in mind two distinct threats: A threat from the outside coming in or a threat from the inside that is already there. Your first goal is to eliminate the threat from coming in. However, if the threat is already inside, the first layer of security has failed, and you must then react to the threat. At that point, you have no choice as you must react. This security survey was developed to help you quickly assess what you have, what you need and areas of vulnerability. Each ques- tion can be answered with a “yes” or “no,” and there is a section where you can write concerns or recommendations. The survey is divided into six sections: Step 1: Securing the Parking Lots, Property, and Buildings Step 2: Securing People Inside of the Worship Buildings Step 3: Securing the Programs Step 4: Emergency Preparedness for Weather, Medical, and Other Emergencies Step 5: Securing the Finances and Membership Data Step 6: Security Suggestions This is the simplest survey form available. Please complete the entire survey; then together with your security committee, develop a “Security Plan” for your facility. Prioritize your areas of vulnerability, and then secure a financial commitment to remedy them. I willingly acknowledge that every facility cannot do everything on the list. However, I know, without a doubt, that every facility can do something, something more than they are currently doing. We must do everything we can to protect those who worship with us. To do nothing is unacceptable. I also recommend that you complete this survey on an annual basis. As your “Security Plan” is implemented, you will begin to no- tice strengths and weaknesses and that will help to keep your security team focused on improvement.

Upload: others

Post on 16-Feb-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    1

    A SECURITY SURVEY FOR HOUSES OF WORSHIP

    A Supplemental Design Instrument for Crime Prevention for Houses of Worship

    By Paula L. RatliffPublished by the ASIS International 2015.

    Every place of worship is different in size and design. Some places of worship may be a single building with a few attendees. Other places may contain multiple buildings and entrances with thousands attending services and events every day from morning to night with activities for all ages. The design and purpose may be as different as the theology and philosophy taught inside.

    Therefore, a security program must be uniquely designed for your facility, placing equal priorities on the safety of people, programs, property, and preparedness for emergencies. The level of security will often be determined by financial and personnel resources; yet, it is imperative that you do something to protect those who worship with you.

    As you begin to evaluate your property, keep in mind two distinct threats: A threat from the outside coming in or a threat from the inside that is already there. Your first goal is to eliminate the threat from coming in. However, if the threat is already inside, the first layer of security has failed, and you must then react to the threat. At that point, you have no choice as you must react.

    This security survey was developed to help you quickly assess what you have, what you need and areas of vulnerability. Each ques-tion can be answered with a “yes” or “no,” and there is a section where you can write concerns or recommendations. The survey is divided into six sections:

    Step 1: Securing the Parking Lots, Property, and Buildings

    Step 2: Securing People Inside of the Worship Buildings

    Step 3: Securing the Programs

    Step 4: Emergency Preparedness for Weather, Medical, and Other Emergencies

    Step 5: Securing the Finances and Membership Data

    Step 6: Security Suggestions

    This is the simplest survey form available. Please complete the entire survey; then together with your security committee, develop a “Security Plan” for your facility. Prioritize your areas of vulnerability, and then secure a financial commitment to remedy them. I willingly acknowledge that every facility cannot do everything on the list. However, I know, without a doubt, that every facility can do something, something more than they are currently doing. We must do everything we can to protect those who worship with us. To do nothing is unacceptable.

    I also recommend that you complete this survey on an annual basis. As your “Security Plan” is implemented, you will begin to no-tice strengths and weaknesses and that will help to keep your security team focused on improvement.

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    2

    STEP 1: SECURING THE PARKING LOTS, PROPERTY, AND BUILDINGS

    Instructions: Complete this checklist to evaluate the parking lots, the outside perimeter of the property and the entrances to buildings.

    1. Basics: These must be YES answers!

    Do we have an alarm system with motion detectors? q q

    Do we have cameras placed strategically throughout the building? q q

    Do we have cameras placed strategically throughout the campus? q q

    Do we have our alarm system monitored 24/7? q q

    2. Are the property lines clearly distinguishable with fences or landscape features? Note: Landscaping around the property and/or buildings should be singular bushes/trees that do not obstruct observation. Fences can define the perimeter and limit access.

    3. Are there barriers along the perimeter to prohibit a vehicle from driving into crowds of people or the buildings?

    4. Are parking lots visible from many directions and on the cameras?

    5. Are walkways clear and visible from many directions and on the cameras?

    6. Is there adequate lighting and cameras on:

    Parking lots q q

    Pedestrian walk ways q q

    Sidewalks q q

    Each entrance to the buildings q q

    Each entrance to the campus q q

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    3

    7. Do we have security officers to provide security services?

    Do we have volunteers to provide security services? q q

    Is there a balance in having both? q q

    8. Do we provide security in the parking lots during services?

    9. Do we have security observing who is coming into the parking lots, then the building, and what they are carrying with them?

    10. If we have multiple parking lots, can some be closed off/secured during non-busy times?

    11. Can speed bumps and traffic arms be installed to complicate an expedited exit?

    12. Evaluate each entrance to the property.

    Is each entrance clearly marked with our address? q q

    Is each entrance well-lighted? q q

    13. Are the entrances visible from many directions and cameras?

    Note: Entrances should remain clear to allow emergency vehicles access at all times.

    14. Are parking lots and buildings marked with clear signage?

    15. Are signs posted to indicate parking for visitors?

    16. Are signs posted to indicate that the area is under surveillance and/or recording?

    17. Is there a designated location for deliveries and mail?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    4

    18. Are staff and/or volunteers who work with the mail trained in how to identify a bomb and other harmful substances, and do they know what to do if they find any type of substance?

    19. Evaluate each entrance door to each building. Can each door be locked from the inside and the outside?

    20. Are emergency doors equipped with panic hardware and local alarms to signal that the door is open?

    21. Review each window in each building.

    Can someone gain access to the building through a window? q q

    Are the windows covered in non-breakable or bullet-resistant glass? q q

    Glass should be shatterproof—3/8” at least. q q

    If the windows have locks, include checking them as part of your closing/locking procedures after each event. q q

    Are windows secured with intrusion alarm systems? q q

    22. Evaluate the roof on each building. Can someone gain access to the building thru the roof by accessing a skylight, ventilator shaft, roof latch, etc.?

    23. Are air conditioning units and system components fenced in or encaged with bars?

    24. Do you have additional buildings where lawn equipment or other necessities are stored? Are the doors locked? Are hazardous materials clearly identified and in proper containers?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    5

    STEP 2: SECURING THE PEOPLE INSIDE OF THE WORSHIP BUILDINGS

    Instructions: Complete this checklist to evaluate security efforts in the buildings used for worship. You may need to complete this section for each additional building.

    1. Is each entrance to the building attended by someone acting as a greeter during worship times?

    2. Do the greeters have an effective way to communicate with each other? 2-way radios, cell phones, intercoms, etc.

    3. Are entrances locked when not in use?

    4. Are telephones, intercoms, or electronic scanners available to allow access when the facility is locked?

    Note: Electronic scanners can log in time in/time out, etc. It depends on the needs of your facility as to how much data you wish to capture.

    5. Do we need X-ray machines or metal detectors for entrances and/or package screening?

    6. Are security cameras observed prior to and during services?

    7. Are security personnel/volunteers dispersed throughout the building during the services trained in observation skills?

    8. Are security cameras installed and observable to visitors in the:

    Parking lots q q

    Entrances q q

    Cameras pointed toward entrance doors q q

    Cameras pointed away from entrance doors q q

    Hallways q q

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    6

    Worship Center/Sanctuary q q

    Prayer Rooms q q

    Classrooms q q

    Nursery q q

    Youth Center q q

    Gymnasium q q

    Cafeteria q q

    Ballfields and playgrounds q q

    Bus and van loading areas q q

    Elevators q q

    Baptismal area (non-dressing area) q q

    Restroom entrances q q

    Offices q q

    Counseling Center/Rooms q q

    Depository/Safe Area q q

    Air conditioning systems q q

    ___________________________________________ q q

    10 When a room is vacated, is the door immediately locked?

    11. Do you have locking procedures for every building?

    Note: Motion detector sensors tied to the alarms are great indicators of any movement in the building.

    12. Does every door have a lock from both the inside and outside?

    13. Does every classroom and office have doors with viewable windows? (Glass should be shatterproof.)

    14. Are offices, camera viewing stations, pulpits, platforms, and choir lofts presented with an emergency exit route?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    7

    15. Are offices, camera viewing stations, pulpits, and stages equipped with silent emergency alarms?

    16. Is there an area where people on the platform can take shelter in the event of an active shooter?

    17. If an active shooter enters the sanctuary, do you have a plan?

    18. If an armed robber approaches the administrative offices, do you have a plan?

    19. If your facility allows individuals to carry weapons, do you ensure they are adequately trained in the usage of such weapons?

    20. Are volunteers, staff, and security personnel trained in how to identify and respond to:

    A mentally disturbed person q q

    A person who is intoxicated or high q q

    A person with a backpack or unusual suitcase q q

    A person who does not seem to “belong” in your setting q q

    A known pedophile who arrives for services q q

    An unknown pedophile who arrives for services q q

    An angry person q q

    An estranged spouse q q

    Weather emergencies q q

    Medical emergencies q q

    Accusation of abuse and/or neglect q q

    21. If volunteers, staff, and/or security personnel need to summon additional personnel, do you have a system?

    22. Are all exits clearly marked the appropriate signage? Electric? Battery backup?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    8

    23. Are hallways and stairwells lighted in the event of a power outage?

    24. Do we have a system in place so that staff and volunteers know how to “shelter in place” or to “lock down” the building?

    25. Do our staff and/or volunteers know what to do if they “think” they hear gunfire?

    26. Do we have a key inventory or electronic readers with specific codes for each individual who needs access to the building?

    27. Do we know who has keys or codes to the building? Do we know if anyone has lost keys or shared codes to the building?

    28. Do we secure areas to prevent unauthorized entry? Such as:

    The pastor/clergy/minister offices q q

    Administrative offices q q

    Counseling offices q q

    Vault/Money room q q

    Supply closets q q

    Baptismal q q

    Control rooms q q

    Confession booths q q

    Camera viewing stations q q

    Nursery and childcare rooms q q

    Classrooms q q

    Lunchroom/Dinner hall q q

    29. Do we secure musical instruments, sound equipment, purses, or anything of value in a locked areas?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    9

    30. Are the buildings protected by an alarm system? Who needs to know the contact information and codes?

    31. What is connected to the alarm system?

    Exterior doors? q q

    Interior doors? q q

    Windows? q q

    Vault? q q

    Hallways? q q

    Motion detection? q q

    Does it indicate when a door or window is not closed? q q

    32. Will the alarm system detect breakage on windows and doors?

    33. Does the alarm system include panic/duress buttons?

    If yes, where are they located?

    Who is called?

    Are the police immediately dispatched? q q

    34. Does the camera system offer zoom lens or pan-tilt capability?

    35. Is the alarm connected with the cameras and recording when activated?

    36. Is someone designated to check the recordings, back-ups, storage, and retrieval systems?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    10

    STEP 3: SECURING THE PROGRAMS Instructions: Complete this checklist to evaluate security efforts to secure the various programs offered at your place of worship. For example, if your place of worship provides a nursery or childcare, school classes, community classes, and services, etc. there are various levels of security that need to be considered. You may need to complete this checklist for each building that offers programs. For example, if you offer recovery classes or classes for anger management, these may require additional supervision and security.

    1. If your facility has pastoral, administrative or counseling offices, are they in an area that has:

    Limited access (people are screened prior to entrance) q q

    Cameras q q

    Emergency exits q q

    Silent alarms q q

    “Code” page for assistance q q

    Purses, money, valuables secured q q

    Windows in every door and/or classroom q q

    2. At any given time, how do you know how many people are in the building and who they are?

    3. Do you have safes to secure money and important documents?

    4. Do we have a procedure for transporting money to the bank?

    5. Do we have a procedure for counting the money?

    6. Do we have cameras and appropriate lighting in all classrooms, restrooms, and hallways?

    7. Do we ensure that all workers and volunteers pass a background check with fingerprints and ensure the references are verified?

    NOTE: It is recommended that you know individuals at least six months before allowing them to volunteer and/or work with children.

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    11

    8. Have we implemented the “Rule of Two” with no exceptions?

    9. Do we have a policy to ensure that the drop-off and pick-up parents are correct?

    10. Do we have a data sheet (and subsequent database) on each child that contains identifying information, allergies, medications, emergency contacts, and drop off and pick up authorizations? These data sheets may need to be removed and carried out quickly in the event of an emergency.

    11. When we plan events with overnight stays, do we ensure adequate adult supervision with adults supervising the adults?

    12. Are workers and volunteers trained on state and local law regarding child abuse and neglect?

    13. Is our environment “encouraging” to individuals to report abuse or violence that happens in the home? Note: Many times, it is an enraged spouse that initiates violence in houses of worship.

    14. Are workers and volunteers trained to take any and every accusation seriously and to report it to the director of security and local law enforcement?

    15. Does our facility create an environment where children and young people will come forward with any and all reports and/or attempts at inappropriate behavior?

    STEP 1: SECURING THE PARKING LOTS, PROPERTY, AND BUILDINGS

    Instructions: Complete this checklist to evaluate the parking lots, the outside perimeter of the property and the entrances to buildings.

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    12

    STEP 4: EMERGENCY PREPAREDNESS FOR WEATHER, MEDICAL, AND OTHER EMERGENCIES

    Instructions: Complete this checklist to evaluate security efforts and initiatives you have in place for natural disasters and medical emergencies.

    1. Do we have someone (and/or a team) designated to be in charge in the event of an emergency?

    2. Do we have an emergency preparedness plan that addresses weather emergencies, medical emergencies, and man-made emergencies that could happen at our facility or adjacent to our facility?

    3. Do we have a list of names, titles, phone numbers, etc. of people to contact in the event of an emergency for extra volunteers?

    4. Do we have fire extinguishers in every building and around every area that uses gas, stoves, grills, and/or flames?

    Note: The majority of all fires begin in the kitchen or from a candle.

    5. Do we have an evacuation plan for each building?

    Note: This should be practiced at least once or twice a year.

    6. Do we have an area designated for medical emergencies? How is this area lighted?

    7. Do we have gloves and masks readily available?

    Note: Medical staff should be trained in how to handle hazardous body fluids.

    8. Do we have a first aid kit? Defibrillator? Narcan?

    9. Do we have a doctor or nurse or standby during services and events? How far is the closest ambulance?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    13

    10. Are volunteers, staff and security personnel trained in CPR and other life-saving actions?

    11. Do we have individuals designated to help individuals with disabilities in the event of an emergency?

    12. Is someone trained in how to shut down the key mechanical and/or utility systems and/or electrical systems?

    13. Is there a designated area for a storm shelter?

    14. Do we have an emergency kit with flashlights, batteries, radios, water, first aid kits, supplies, blankets, and phones?

    15. Do we have bottled water and food available?

    16. Do we have someone designated who can speak to the media on behalf of the congregation, regardless of the type of emergency?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    14

    STEP 5: SECURING THE FINANCES AND MEMBERSHIP DATA Instructions: Complete this checklist to evaluate security efforts you have in place for securing financial and membership data.

    1. Do we have a computer system that tracks membership data that is secured with adequate firewalls?

    2. Do we back up membership data and financial giving records on a regular or daily basis?

    3. Are the back-ups stored on site or in the cloud?

    4. Is the mainframe in a climate-controlled environment with surge protections and back-up power? Is it away from a sprinkler?

    5. Do employees and/or volunteers sign a non-disclosure agreement prior to working with membership and/or financial information?

    6. Do we have financial policies that directs on how donations are handled and how expenses are approved and paid?

    7. Do we have financial procedures on how donated money/checks are processed?

    After collection, how is the money secured?

    Who has access to the area where the money is secured?

    Is the money counted in a room with cameras? q q

    When/who counts the money and prepares the deposits?

    Who handles the mail each day to process donations?

    Who processes credit card donations?

    How are the numbers secured?

    Are donations made over the phone?

    How is this information secured?

    Who has access to donations and tracks this information for end-of-year tax donation receipts?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    15

    How is this information secured?

    Who ensures the actual deposit matches what was prepared?

    Who approves financial expenditures and payments?

    Who reconciles the checking account every month?

    Who verifies credit card purchases?

    How/when are deposits transported to the bank?

    8. Do our financial policies require a review or an audit every year conducted by an outside firm?

    9. Do we review credit reports on employees and/or volunteers that handle money?

    10. Do we have layers of review for expenditures? For example, the person who uses the credit card for purchases is not the person who pays the credit card bill.

    11. Are invoices reviewed by multiple people on a random basis to ensure that bogus companies, invoices, and/or employees are not being paid?

    12. Does the position of treasurer rotate on a frequent basis so that others can review the bank statements and ask questions?

    13. Does our administering board review reconciliation reports and bank statements on a monthly basis?

    14. Do we require dual signatures for purchases over a certain amount? Example: $500.

    15. Do we have a policy of “No Cash” on the premises?

    16. How do we provide benevolence assistance? Gift cards? Cash? Checks?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    16

    STEP 6: SECURITY SUGGESTIONSInstructions: Complete this checklist to evaluate your overall security efforts.

    1. Is our church leadership engaged in our security plan?

    Note: For plans to be effective, they must be.

    2. Do we have a security plan for our facility?

    3. Do we have a network of security professionals to help implement security recommendations?

    4. Do we train our network on observation, use of force, proper response, and how to de-escalate a situation?

    5. Do we re-train our network every year?

    6. Do we allow individuals to carry firearms? Do we insist that they participate on our security team for training?

    7. Do we have a key/access control policy for our buildings?

    8. Do we have opening and closing procedures for each building with a designated person?

    9. Do we have a detailed property inventory list with serial numbers? It should be updated with every new purchase. Take pictures and/or video of computers, electronics, safes, musical instruments, communion trays, artwork, statues, and anything of value. Store this document off-site or in the cloud.

    10. Do we maintain personnel files on every worker and volunteer? Keep files locked securely.

    11. Do we conduct a thorough background check (signed waivers) on every employee/volunteer? Do we run a state and federal background check, as well as talking to previous clergy leaders, neighbors, and references?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    17

    12. Do our volunteers/employees who are transporting attendees have clear driving records? This should be updated every year. Note: Every driver must be listed on your insurance policy for coverage.

    13. Do we conduct background checks on employees, youth and children ministers, coaches, mentors, drivers, or teachers either in a paid or volunteer positions?

    14. Do we have one person designated who will speak to the media should a tragic event happen at our facility?

    15. Do we have a manual with all of the contact information and account information for the following:

    Gas lines and connection q q

    Electrical power q q

    Water supply q q

    Telephones q q

    Alarm System q q

    Security Coordinator q q

    Media designee q q

    Emergency management planners q q

    Local media q q

    16. How would we contact parents/members/community should a tragedy occur? Text? Twitter? Facebook? Phone? Who keeps this information up-to-date?

    17. Have we solicited advice and input from local law enforcement?

    18. Has our security plan been reviewed by legal and our administering board?

    19. Has this survey instrument helped to identify areas of weakness?

    Yes No Recommendations/Concerns

  • Developed by Paula L. Ratliff | Author of Crime Prevention for Houses of Worship | 2nd edition published by the ASIS International, 2015

    18

    20. Do we realize that our security plan will be a living document that will need to be reviewed and updated on a regular basis as new threats emerge and things simply change?

    21. Have we made a financial commitment to improving the security at our place of worship, with the understanding that it will continue to increase as equipment is updated and added, and as we add additional security initiatives to new programs and events?

    Yes No Recommendations/Concerns

    Check Box 2: OffCheck Box 5: OffCheck Box 110: OffCheck Box 112: OffCheck Box 114: OffCheck Box 116: OffCheck Box 118: OffCheck Box 120: OffCheck Box 122: OffCheck Box 3: OffCheck Box 7: OffCheck Box 9: OffCheck Box 11: OffCheck Box 4: OffCheck Box 8: OffCheck Box 10: OffCheck Box 12: OffCheck Box 1: OffCheck Box 6: OffCheck Box 111: OffCheck Box 113: OffCheck Box 115: OffCheck Box 117: OffCheck Box 119: OffCheck Box 121: OffCheck Box 123: OffCheck Box 13: OffCheck Box 124: OffCheck Box 15: OffCheck Box 17: OffCheck Box 19: OffCheck Box 21: OffCheck Box 23: OffCheck Box 25: OffCheck Box 27: OffCheck Box 29: OffCheck Box 14: OffCheck Box 125: OffCheck Box 16: OffCheck Box 18: OffCheck Box 20: OffCheck Box 22: OffCheck Box 24: OffCheck Box 26: OffCheck Box 28: OffCheck Box 30: OffCheck Box 210: OffCheck Box 212: OffCheck Box 211: OffCheck Box 213: OffCheck Box 214: OffCheck Box 216: OffCheck Box 215: OffCheck Box 217: OffCheck Box 31: OffCheck Box 33: OffCheck Box 35: OffCheck Box 37: OffCheck Box 39: OffCheck Box 41: OffCheck Box 126: OffCheck Box 32: OffCheck Box 34: OffCheck Box 36: OffCheck Box 38: OffCheck Box 40: OffCheck Box 42: OffCheck Box 127: OffCheck Box 128: OffCheck Box 129: OffCheck Box 218: OffCheck Box 220: OffCheck Box 222: OffCheck Box 224: OffCheck Box 226: OffCheck Box 219: OffCheck Box 221: OffCheck Box 223: OffCheck Box 225: OffCheck Box 227: OffCheck Box 43: OffCheck Box 45: OffCheck Box 47: OffCheck Box 49: OffCheck Box 51: OffCheck Box 53: OffCheck Box 55: OffCheck Box 44: OffCheck Box 46: OffCheck Box 48: OffCheck Box 50: OffCheck Box 52: OffCheck Box 54: OffCheck Box 56: OffCheck Box 228: OffCheck Box 230: OffCheck Box 232: OffCheck Box 234: OffCheck Box 236: OffCheck Box 229: OffCheck Box 231: OffCheck Box 233: OffCheck Box 235: OffCheck Box 237: OffCheck Box 57: OffCheck Box 59: OffCheck Box 61: OffCheck Box 58: OffCheck Box 60: OffCheck Box 62: OffCheck Box 130: OffCheck Box 131: OffCheck Box 132: OffCheck Box 133: OffCheck Box 238: OffCheck Box 240: OffCheck Box 242: OffCheck Box 244: OffCheck Box 246: OffCheck Box 248: OffCheck Box 250: OffCheck Box 252: OffCheck Box 254: OffCheck Box 256: OffCheck Box 258: OffCheck Box 260: OffCheck Box 262: OffCheck Box 264: OffCheck Box 266: OffCheck Box 268: OffCheck Box 270: OffCheck Box 239: OffCheck Box 241: OffCheck Box 243: OffCheck Box 245: OffCheck Box 247: OffCheck Box 249: OffCheck Box 251: OffCheck Box 253: OffCheck Box 255: OffCheck Box 257: OffCheck Box 259: OffCheck Box 261: OffCheck Box 263: OffCheck Box 265: OffCheck Box 267: OffCheck Box 269: OffCheck Box 271: OffCheck Box 63: OffCheck Box 65: OffCheck Box 67: OffCheck Box 69: OffCheck Box 71: OffCheck Box 73: OffCheck Box 294: OffCheck Box 64: OffCheck Box 66: OffCheck Box 68: OffCheck Box 70: OffCheck Box 72: OffCheck Box 74: OffCheck Box 295: OffCheck Box 272: OffCheck Box 274: OffCheck Box 276: OffCheck Box 278: OffCheck Box 280: OffCheck Box 282: OffCheck Box 284: OffCheck Box 286: OffCheck Box 288: OffCheck Box 290: OffCheck Box 292: OffCheck Box 273: OffCheck Box 275: OffCheck Box 277: OffCheck Box 279: OffCheck Box 281: OffCheck Box 283: OffCheck Box 285: OffCheck Box 287: OffCheck Box 289: OffCheck Box 291: OffCheck Box 293: OffCheck Box 77: OffCheck Box 79: OffCheck Box 81: OffCheck Box 83: OffCheck Box 85: OffCheck Box 87: OffCheck Box 78: OffCheck Box 80: OffCheck Box 82: OffCheck Box 84: OffCheck Box 86: OffCheck Box 88: OffCheck Box 134: OffCheck Box 135: OffCheck Box 296: OffCheck Box 298: OffCheck Box 300: OffCheck Box 302: OffCheck Box 304: OffCheck Box 306: OffCheck Box 308: OffCheck Box 3010: OffCheck Box 3018: OffCheck Box 3012: OffCheck Box 3014: OffCheck Box 3016: OffCheck Box 297: OffCheck Box 299: OffCheck Box 301: OffCheck Box 303: OffCheck Box 305: OffCheck Box 307: OffCheck Box 309: OffCheck Box 3011: OffCheck Box 3019: OffCheck Box 3013: OffCheck Box 3015: OffCheck Box 3017: OffCheck Box 89: OffCheck Box 91: OffCheck Box 93: OffCheck Box 95: OffCheck Box 90: OffCheck Box 92: OffCheck Box 94: OffCheck Box 96: OffCheck Box 136: OffCheck Box 137: OffCheck Box 138: OffCheck Box 139: OffCheck Box 310: OffCheck Box 312: OffCheck Box 314: OffCheck Box 316: OffCheck Box 318: OffCheck Box 320: OffCheck Box 322: OffCheck Box 311: OffCheck Box 313: OffCheck Box 315: OffCheck Box 317: OffCheck Box 319: OffCheck Box 321: OffCheck Box 323: OffCheck Box 326: OffCheck Box 327: OffCheck Box 99: OffCheck Box 101: OffCheck Box 103: OffCheck Box 105: OffCheck Box 100: OffCheck Box 102: OffCheck Box 104: OffCheck Box 106: OffCheck Box 140: OffCheck Box 141: OffCheck Box 328: OffCheck Box 330: OffCheck Box 332: OffCheck Box 334: OffCheck Box 336: OffCheck Box 338: OffCheck Box 340: OffCheck Box 329: OffCheck Box 331: OffCheck Box 333: OffCheck Box 335: OffCheck Box 337: OffCheck Box 339: OffCheck Box 341: OffCheck Box 107: OffCheck Box 109: OffCheck Box 1011: OffCheck Box 1013: OffCheck Box 1015: OffCheck Box 1017: OffCheck Box 1019: OffCheck Box 1021: OffCheck Box 108: OffCheck Box 1010: OffCheck Box 1012: OffCheck Box 1014: OffCheck Box 1016: OffCheck Box 1018: OffCheck Box 1020: OffCheck Box 1022: OffCheck Box 1023: OffCheck Box 1025: OffCheck Box 1027: OffCheck Box 1029: OffCheck Box 1031: OffCheck Box 1033: OffCheck Box 1035: OffCheck Box 1037: OffCheck Box 1039: OffCheck Box 1024: OffCheck Box 1026: OffCheck Box 1028: OffCheck Box 1030: OffCheck Box 1032: OffCheck Box 1034: OffCheck Box 1036: OffCheck Box 1038: OffCheck Box 1040: OffCheck Box 142: OffCheck Box 143: OffCheck Box 1041: OffCheck Box 1043: OffCheck Box 1042: OffCheck Box 1044: OffCheck Box 144: OffCheck Box 145: OffCheck Box 146: OffCheck Box 147: OffCheck Box 148: OffCheck Box 149: OffCheck Box 150: OffCheck Box 151: OffCheck Box 152: OffCheck Box 153: OffCheck Box 154: OffCheck Box 155: OffCheck Box 156: OffCheck Box 157: OffCheck Box 158: OffCheck Box 159: OffCheck Box 160: OffCheck Box 161: OffCheck Box 162: OffCheck Box 163: OffCheck Box 164: OffCheck Box 165: OffCheck Box 166: OffCheck Box 167: OffCheck Box 344: OffCheck Box 345: OffCheck Box 342: OffCheck Box 343: OffCheck Box 168: OffCheck Box 169: OffCheck Box 170: OffCheck Box 171: OffCheck Box 172: OffCheck Box 173: OffCheck Box 174: OffCheck Box 175: OffCheck Box 176: OffCheck Box 177: OffCheck Box 178: OffCheck Box 179: OffCheck Box 180: OffCheck Box 181: OffCheck Box 182: OffCheck Box 183: OffCheck Box 184: OffCheck Box 185: OffCheck Box 186: OffCheck Box 187: OffCheck Box 188: OffCheck Box 189: OffCheck Box 190: OffCheck Box 191: OffCheck Box 192: OffCheck Box 193: OffCheck Box 346: OffCheck Box 347: OffCheck Box 194: OffCheck Box 195: OffCheck Box 348: OffCheck Box 349: OffCheck Box 196: OffCheck Box 197: OffCheck Box 198: OffCheck Box 199: OffCheck Box 200: OffCheck Box 201: OffCheck Box 2018: OffCheck Box 2019: OffCheck Box 202: OffCheck Box 203: OffCheck Box 204: OffCheck Box 205: OffCheck Box 206: OffCheck Box 207: OffCheck Box 208: OffCheck Box 209: OffCheck Box 2010: OffCheck Box 2011: OffCheck Box 2012: OffCheck Box 2013: OffCheck Box 350: OffCheck Box 352: OffCheck Box 354: OffCheck Box 356: OffCheck Box 358: OffCheck Box 360: OffCheck Box 362: OffCheck Box 364: OffCheck Box 366: OffCheck Box 351: OffCheck Box 353: OffCheck Box 355: OffCheck Box 357: OffCheck Box 359: OffCheck Box 361: OffCheck Box 363: OffCheck Box 365: OffCheck Box 367: OffCheck Box 2014: OffCheck Box 2015: OffCheck Box 2016: OffCheck Box 2017: Off