{"id":528,"date":"2020-07-14T13:34:12","date_gmt":"2020-07-14T13:34:12","guid":{"rendered":"http:\/\/www.klsecurity.com\/blog\/?p=528"},"modified":"2020-07-14T13:49:59","modified_gmt":"2020-07-14T13:49:59","slug":"marijuana-facility-security-how-much-is-good-enough","status":"publish","type":"post","link":"https:\/\/www.klsecurity.com\/blog\/marijuana-facility-security-how-much-is-good-enough\/","title":{"rendered":"Marijuana Facility Security: How Much is Good Enough?"},"content":{"rendered":"\n<p>By Shelley Swearingen | July 14, 2020<\/p>\n\n\n\n<h5>Why is security so important?<\/h5>\n\n\n\n<p>Security protocols dictate how an organization plans to protect their employees. Security protocols set forth how a business will protect their bottom line. Cannabis security planning protocols establish how a facility will safeguard &amp; protect inventory and cash. All of these plans and protocols affect the bottom line, and therefore should be on the forefront of every stakeholder\u2019s mind.<\/p>\n\n\n\n<h5>A good security plan should:<\/h5>\n\n\n\n<ul><li><a href=\"https:\/\/www.klsecurity.com\/index.php\/dea-tl15-69x38x32-512.html\" target=\"_blank\" rel=\"noreferrer noopener\">deter theft of product\/cash<\/a><\/li><\/ul>\n\n\n\n<ul><li><a href=\"https:\/\/www.klsecurity.com\/index.php\/gunnebo-d11-secure-cash-deluxe.html\" target=\"_blank\" rel=\"noreferrer noopener\">prevent internal diversion<\/a><\/li><\/ul>\n\n\n\n<ul><li><a href=\"https:\/\/www.klsecurity.com\/index.php\/class-1-vault-room-panels.html\" target=\"_blank\" rel=\"noreferrer noopener\">be scalable, grow with business<\/a><\/li><\/ul>\n\n\n\n<ul><li><a href=\"https:\/\/www.klsecurity.com\/index.php\/catalogsearch\/result\/?q=bulletproof\" target=\"_blank\" rel=\"noreferrer noopener\">protect employees, visitors, patients, products, currency, security equipment, shipping, receiving and\/or transportation<\/a><\/li><\/ul>\n\n\n\n<ul><li><a href=\"https:\/\/www.klsecurity.com\/index.php\/march-networks-8-camera-package.html\" target=\"_blank\" rel=\"noreferrer noopener\">deter, detect, &amp; delay burglaries<\/a><\/li><\/ul>\n\n\n\n<ul><li><a href=\"https:\/\/www.klsecurity.com\/index.php\/iosafe-218-nas-2-x-1-tb-fireproof-waterproof-private-cloud-server.html\" target=\"_blank\" rel=\"noreferrer noopener\">protect against fire, floods, &amp; other natural disasters<\/a><\/li><\/ul>\n\n\n\n<h5>Why do security guidelines vary from state to state?<\/h5>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cannabis is illegal at the federal level. In recent history, the federal government has stayed out of the way of states and allowed states to govern these sectors independently. This means that when marijuana is legalized within a state, the state government must create an entire market and all the rules and regulations that go along with it. Some states will look to other places that have implemented successful programs, and some just wing it.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Some states have very little regulatory requirements when it comes to the operation of businesses, and certain areas of concern that are normally heavily regulated in other industries (like security) are barely glossed over in the legislation. This is due to the illegal status of the substance at the federal level. Many states anticipate marijuana becoming legal nationwide at some point. When this happens, no action would be needed as federal law supersedes state law.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.klsecurity.com\/cannabis-facility-design-and-planning.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" width=\"1024\" height=\"744\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/07\/Legalization-Initiatives-By-State-1-1024x744.png\" alt=\"\" class=\"wp-image-530\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/07\/Legalization-Initiatives-By-State-1-1024x744.png 1024w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/07\/Legalization-Initiatives-By-State-1-300x218.png 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/07\/Legalization-Initiatives-By-State-1-768x558.png 768w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/07\/Legalization-Initiatives-By-State-1-1536x1117.png 1536w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/07\/Legalization-Initiatives-By-State-1-2048x1489.png 2048w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/07\/Legalization-Initiatives-By-State-1-1200x872.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n\n<h5>Why is compliance so important?<\/h5>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Staying compliant means staying operational. Facilities operating within a legal marijuana market are subject to random inspections. If a facility didn\u2019t pass an inspection, it could be slapped with a hefty fine and\/or forced to close until the infraction is brought up to standard. This means lost sales on top of expensive fines &amp; the facility could take a hit to their reputation. Remember: a facility will never be fined for being too safe. It may seem daunting to spend (invest) a large sum into securing a facility, but down the road \u2013 it makes fiscal sense.<\/p>\n\n\n\n<h5>What implementations should a facility employ?<\/h5>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; From license application and project inception to completion, KL Security uses a holistic approach to help plan, create, design, and build compliant security solutions &amp; systems to meet a business\u2019s goals, brand, and mission. With successful projects in place in dispensaries, pharmacies, cultivation facilities, craft growing facilities, secure transporters, and testing facilities, the experts at KL Security have the experience to help facilities pass inspections, stay compliant, and drive revenue. Contact a consultant to see how KL Security can help simplify the process and provide successful results.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"background-color:#f19d0d;font-size:18px\" class=\"has-text-color has-background has-text-align-center has-white-color\">Call 866-867-0306 or email <a href=\"mailto:contact@klsecurity.com\">contact@klsecurity.com<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:14px\">Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Shelley Swearingen | July 14, 2020 Why is security so important? Security protocols dictate how an organization plans to protect their employees. Security protocols set forth how a business will protect their bottom line. Cannabis security planning protocols establish how a facility will safeguard &amp; protect inventory and cash. All of these plans and &hellip; <a href=\"https:\/\/www.klsecurity.com\/blog\/marijuana-facility-security-how-much-is-good-enough\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Marijuana Facility Security: How Much is Good Enough?<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":529,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[132,211,124,122,116],"tags":[222,177,133,202,197,216,194,188,136,200,225,190,180,212,185,181,119,120,226],"_links":{"self":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/528"}],"collection":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=528"}],"version-history":[{"count":7,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/528\/revisions"}],"predecessor-version":[{"id":538,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/528\/revisions\/538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media\/529"}],"wp:attachment":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}