Why Does an Assisted Living Facility Need a Security System?

Assisted Living FacilityAssisted living facilities are dynamic environments.  You have occupants with varying levels of medical needs alongside administrative, medical, and visiting personnel.  It’s a somewhat complex security issue because residents and staff need to be able to move throughout the facility freely, but unauthorized entrants must somehow be kept out.  The mental health and acuity of residents can also be a cause for concern.  In an aging population medical conditions like dementia and Alzheimer’s can cause residents to wander off or get lost which is a major concern for staff and resident relatives.  Thankfully by implementing security system solutions many of these concerns can be addressed.

At Perfect Connections, Inc. our licensed security system integrators have been providing comprehensive security solutions to healthcare facilities throughout northern and central New Jersey for the past 23 years.  Our team understands the importance of securing assisted living facilities isn’t solely about protecting physical assets, it’s about ensuring the safety and security of the people that live and work there.  It’s about providing a peace of mind to not only the staff and residents, but resident’s families as well.

Comprehensive security systems should include fire alarms, smoke and carbon monoxide detectors, burglar alarms, a surveillance system, access control, and a monitoring service.  One of the most important components that should concern assisted living facilities is access control.  Access control can be implemented in a number of ways and an assisted living facility may require more than one mode.

The on-site staff will likely need access to areas where medication is stored and administrative offices, supply rooms, and medical records etc.  Access not only has to be convenient, but limited to authorized staff.  The reason this can sometimes be challenging is because residents want to be able to roam throughout the facility freely as do visitors.  Fortunately with access control solutions the chances of a resident or visitor wandering into a restricted area are lowered significantly.

By installing readers at entries and distributing credentials (fobs, swipe cards, and proximity cards) to authorized users, access will be limited.  The benefit of using readers in conjunction with credentials vs traditional locks and keys is you don’t have to worry about lost or stolen keys.  Cards and fobs can be remotely disabled whereas a lost key may never be recovered which ultimately leads to changing out the locks and over time that can be costly.

According to Mark Jarman, President of Inovonics, “…the assisted living market has changed from one of simply providing clinical care, much like hospitals, to sprawling campuses which are often a blend of independent living, assisted living and skilled nursing services.”  This creates a more complex environment that requires increased safety and vigilance.  Assisted living facilities are full of activity, the constant coming and going of staff, residents, and visitors, it can be challenging to keep an eye on everything, that’s why having a surveillance system is vital.  It’s a helpful tool that allows staff to keep track of patients that might have the tendency to wander and it gives residents a peace of mind.  In the event an intruder is able to gain access to the facility, surveillance will help authorities catch the perpetrator and depending on the type of system, it can even be setup to send real-time alerts to staff members on their mobile devices.

Aside from surveillance and access control solutions it’s imperative and likely required by local and national laws to have a fire alarm system and smoke and carbon monoxide detectors.  Fire alarm systems and detectors are lifesaving components that when tied to a monitored security system become even more effective.  With a monitored system, when an alarm sounds, a signal is sent to the monitoring station which then immediately alerts emergency responders, and in unpredictable situations it is imperative to have the quickest response possible.  This is critical in an assisted living facility as residents are likely slower moving and may have impaired hearing or eyesight.  Some fire alarm systems can even indicate which detectors or alarms within the facility initiated the alert which is helpful to responders as they’ll have a better idea where to start when they arrive on site.

The reasons why an assisted living facility would need a security system are evident.  There is a need to protect residents, staff, visitors, medical records, physical assets, and facility property.  A comprehensive security system that includes access control, surveillance, fire alarms, smoke and carbon monoxide detectors, and a monitoring service is essential.  At Perfect Connections, Inc. our licensed integrators can help design a custom and comprehensive system that is tailored to the specific needs of your facility.  Every organization is unique and should be treated as such, especially when it comes to matters of security.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by U.S. Department of Agriculture-Flickr-Creative Commons

What Is Web-Based Access Control?

Scott Lewis-smart lockThe technological climate is swiftly changing the way we connect and interact with the physical world.  Endless runs of cable and spaghetti wiring is becoming an antiquated notion with the development of wireless internet based equipment.  This is evident in the way some security system integrators are approaching system design and installation.  As industry professionals, our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey for the past 23 years.  It is our goal to not only provide innovative security equipment, but implement components that are effective and make sense within a specific organization.

Access control has always been a top security concern for any establishment.  Whether it means using a lock and key, card reader, or fingerprint, it’s a means by which your business is shielded from unauthorized personnel.  As an integral part of a comprehensive security system, access control mechanisms need to function on the same level as their system counterparts.  Meaning software and technology updates/applications should apply across the board without disrupting the system as a whole.  IP (Internet Protocol)/web-based technologies are making the advancement of security system components more attainable and desirable to both end-users and system integrators.  This is evident in the continuing migration from analog based surveillance to IP.  Web-based technology is not exclusively transforming surveillance, but security systems as a whole, including access control mechanisms.

What does web-based/IP access control really mean?  Your typical access control system is made-up of software, card/badge readers, controllers, and credentials.  In many existing systems today, the software has to be updated manually or on site, the readers and controllers have to be supplied with wired power, and credentials typically constitute a fob or swipe card.  With web-based or IP access control everything from installation to software updates changes.  Much like many IP surveillance cameras, web-based access control systems are connected to a company’s internet network.  Access control that operates over a network opens the door (pun intended) to increased scalability, installation flexibility, remote system access and management, reduction in the need for traditional power outlets, and cost efficiency.  This creates a more open platform for system management and integration.

In the not so distant past access control systems would be designed with products from a single manufacturer.  While this may seem like a good idea, think about what happens if products are discontinued or the manufacturer goes out of business and no longer supports your system.  You’re left with having to start from scratch which is not only a hassle but costly as well.  With web-based access control, components don’t necessarily have to be supplied by one manufacturer.  Being able to source readers, controllers, and credentials from different manufacturers benefits the end user and security integrator by limiting the cost of repair or replacement, as well as creating a smoother transition between software updates and system upgrades.  The technology and software behind these products are becoming more universal which leads to better overall system operation and integration.

The flexibility of web-based access control systems far surpasses physical access controls used in the past.  You have the option to secure multiple entry points at a singular site or across numerous sites nationwide, even worldwide.  Unlike traditional systems, multiple sites can be controlled, updated, and managed from a singular location either on site or remotely over a secured network.  In this sense web-based security features help with system management consolidation; streamlining operation processes making the day-to-day more convenient.

One of the most desirable features of web-based access control systems is the reduction of required cabling.  Depending on the application, readers don’t necessarily have to be wired directly to the network.  This cuts down on cabling and labor costs.  It also provides flexibility in situations where cabling may not be an option, such as installations in historical buildings.  Same is true about the energy supply to readers and locks.  In the past it may have been difficult for integrators to place access control equipment because of a lack in electrical outlets or supply.  Now, with web-based access control equipment, often times power can be supplied through a direct network connection known as PoE (Power over Ethernet).  PoE connections provide power and data to a connected device through a singular cable.

According to Bill Moran, vice president of Sales for Red Cloud Security, “Web-based access control offers features and functionality that enhance an organization’s security posture. From one consolidated screen, administrators can view and manage alarms, video surveillance, facility maps, and identities including photo and personnel details.”  He also points out that in the event of a triggered alarm or someone forcing their way through an entry point, the network can be suspended while cameras at the scene can be accessed for live streaming.  This is where the idea of a comprehensive security system comes into play, where all of the components are easily accessed and essentially working together.

Web-based security features are transforming the way end-users and industry professionals perceive security in general.  In a world that continues to become more and more connected through technological advancement and the IoT (Internet of Things), it only makes sense that the infrastructure of the physical world should follow suit.  Web-based access control is just another step in the direction to a more convenient and secured future.  At Perfect Connections, Inc. our licensed professionals are always looking for and researching technologies that better serve our customers.  Our team has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey since 1992.  We help you connect and protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Scott Lewis-Flickr-Creative Commons

What Are My Access Control Options?

Steven DepoloWhat is access control?  In the simplest of terms it can be explained as a means to allow or deny entry to or exit from a designated space.  Think of the kinds you likely use on a daily basis, a key to lock or unlock your front door or an electronic gate that lets you into the parking garage at work.  But what does it mean, what are the options when it comes to business integration and security systems, and why might your facility need it?  As licensed security systems providers our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We have extensive knowledge and experience in creating comprehensive security systems that often include some form of access control.

Before looking at the different types of access control available it is important to understand why it may be necessary in the first place.  In most cases access control is used as a layer of protection.  What warrants this added layer of protection is subjective.  It could be company assets, valuable materials, sensitive or confidential information, medication (assisted living or healthcare facilities), staff and employees, or any combination of these items.  Regardless of what needs protection, the point is it warrants reinforcement.

The most simplistic and ubiquitous form of access control is a door lock and key.  While this system is effective at creating a temporary barrier, it is not sophisticated enough to prevent a break-in on its own.  Consider how easy it is to lose a key or duplicate one for that matter.  An experienced burglar or criminal could easily pick a standard lock.  This is why many companies turn to more advanced technologies typically provided in conjunction with a comprehensive security system.

An access control system (ACS) consists of the user being issued a “credential” which is then used on an electronic reader typically at the point of entry or in close proximity.  A credential can consist of any predetermined physical item like a plastic ID card or token that is embedded with the appropriate access information.  When it is swiped, tapped, or within range of the electronic reader, access or exit will be permitted.  According to SecurityMagazine.com, “A credential is presented to an electronic reader that gathers information stored on the credential and compares it to preset parameters and information stored in the ACS computer.”

A fairly common form of access control is using a keypad and PIN number or code.  When used individually this type of technology is not always effective.  PINs can be easily stolen by an onlooker observing you entering it.  Wear and tear on the same digits on the keypad can also be a dead give-away to someone looking to gain entry.  When used in combination with other access control methods a keypad can become more effective as an added layer of security.

One of the most secure and pervasive electronic technologies being implemented in the access control industry today is proximity technology.  How does it work?  Basically a plastic card or token (fob) is embedded with an electronic chip and antenna.  The internal chip is coded and when presented within range of the electronic reader the code is transmitted.  If the code is recognized and verified by the reader access will be granted.  The obvious downfall of this type of system is if you were to lose your card/token or if it were stolen.

Looking toward the future a less popular form of access control is sitting on the back-burner.  Biometrics.  According to Steven Hausman biometrics involves, “analyzing physiological and/or behavioral characteristics of the body, both classes of which would be presumably unique to an individual, and thus more reliable than traditional methods of verifying identity.”  This could be anything from fingerprint to vocal recognition.  This technology isn’t as widely used as some of the more traditional forms of access control because of its cost and reliability issues.  Although it may be difficult to replicate physical traits, it can be done.  The television show “Mythbusters” proved that fingerprints can be replicated using latex and ballistics gel.  While this technology may have some kinks to work out, it’s something to keep an eye on in the future.

There are many viable options when it comes to access control integration.  When combined with a comprehensive security system access control technologies become more effective at deterring crime.  A comprehensive system includes not only access control but video surveillance, fire alarms, burglar alarms, and alarm monitoring.  Our team at Perfect Connections, Inc. has been providing access control and security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand you have many concerns when it comes to the security of your business, and we are here to help guide you through the process from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Steven Depolo-Flickr-Creative Commons

Campus Security

Duke University-Nan-Cheng TsaiApplying to college can be one of the most exciting, albeit nerve-racking, times in a young adult’s life.  Same is true for the parents.  It seems to be a bittersweet experience for parents, part of them is excited for their son or daughters future, and the other part is sad to see them “leave the nest.”  Nevertheless, parents are typically by their child’s side throughout the process.  And the process of applying to schools often includes frequent trips to different campuses.  Choosing a school is not all about the campus, even though a student may be slightly swayed if it happens to be located by a beach.  Aesthetics and location aside, parents are looking for what types of safety and security measures are implemented.  They need to know that when they send their baby (no longer a baby) out on their own that they are going to be safe.

Life is unpredictable and no matter what precautions you take, you simply can’t be protected from everything, you can however be prepared.  That is what parents will be looking for during their visits, what types of safeguards are in place in preparation for the unpredictable?  As a leading security system company our team at Perfect Connections, Inc. has been providing comprehensive security solutions to facilities throughout northern and central New Jersey for the past 23 years.  We believe a comprehensive security system includes some form of access control, video surveillance, fire alarms, smoke and carbon monoxide detectors, and alarm monitoring.  That being said we realize college campuses pose a unique security situation.

Today it seems that the majority of schools have a campus security or police force to help manage and maintain safety throughout school grounds.  Campus security often deals with issues of safety pertaining to drugs and alcohol abuse, physical and emotional abuse, gender equality and discrimination, cultural diversity, and violence.  It’s an undeniable fact that certain events have shaped the approach to campus safety over the past decade.  For example the brutal shooting at Virginia Tech in April of 2007 which claimed 32 student and faculty lives.  To help avoid such senseless tragedies todays campus officers work on effective crisis planning.  Having a plan for such an unlikely event helps students, staff, and the community be better prepared ultimately leading to a swifter recovery time.

Aside from an onsite security force there are security features parents and students will be looking for when visiting a campus.  They’ll want to know about campus access, who and where can people gain entry to the campus?  Are there emergency call boxes throughout the campus?  How do students and staff gain entry to educational buildings and dormitories?  Are campus facilities equipped with fire suppression sprinklers and alarms?  These are just a few of the questions parents and potential students might have when visiting a campus.  For a more complete list of potential security concerns see the following from College Parents of America.  Another tool prospective parents and students might use to evaluate a campus’s security is data required by the Jeanne Clery Act.  “Originally known as the Campus Security Act, the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act is the landmark federal law that requires colleges and universities across the United States to disclose information about crime on and around their campuses.”  Under the Jeanne Clery Act colleges and universities are required to:

  • Publish an Annual Security Report
  • Have a public crime log
  • Disclose crime statistics for instances that occur on campus and adjacent non-campus property
  • Issue warnings about Clery Act crimes
  • Create an emergency response, notification and testing policy
  • Compile and report fire data to the federal government and publish an annual fire safety report
  • Enact policies and procedures to handle reports of missing students

For more information on what students and parents will likely be looking for when college hunting check out the following links:

When looking at a college campus you can see the integration of security features that are part of the bigger security picture.  For instance, many schools provide college ID cards to each student.  Sometimes these ID cards are used as credentials access control systems.  These systems allow or deny students access to certain buildings or specific parts of buildings.  Arizona State University uses this type of access control on their campus.  This feature can be tied into an alarm system that can be activated if someone tried to enter a location without the proper permissions.  ID cards also tend to act as access to school cafeteria meal plans, money for campus stores and sometimes local businesses, and sometimes entry to school parking lots.

Video surveillance is security feature that is becoming more prominent on campuses nationwide.  According to Campus Safety Magazine the camera growth among colleges shows, “no signs of slowing down.”  As technology progresses and the need for security increases surveillance systems are being integrated to enhance any and all existing features.  A report published by TechNavio in 2014 predicts, “…school and university spending on video surveillance and access control will be more than $1.1 billion four years from now.”

With the help of technology college campuses across the U.S. are becoming safer for their students, staff, and visitors.  While no security system is infallible, by implementing comprehensive features schools are better preparing themselves for potential disaster.  As leading professionals in the security industry, our team at Perfect Connections, Inc. understands the importance of being prepared.  We have been providing comprehensive security system solutions throughout northern and central New Jersey since 1992.  If you’re looking for expert security service for your campus facility do not hesitate to contact our specialists at 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Nan-Cheng Tsai-Flickr-Creative Commons

Want A Thriving Business? Avoid Employee Theft!

Biz man pointingIn an ideal work environment everyone would get to work on time, perform their duties efficiently, and respect one another.  Unfortunately, the ideal is not always reality.  The success of a business is dependent on many factors, hiring the right employees is a major one.  Your employees are the life-force that drive your business, but they can also be the metaphoric “poison apple” to its success.  The often hidden threat to a successful business is employee theft.

What is employee theft?  Employee theft can be defined as, “any stealing, use or misuse of an employer’s assets without permission.”  Now most people typically think this means cash or items of monetary value but that’s not always the case.  The following will discuss what constitutes employee theft, how it affects businesses in the U.S., who the main offenders are, and how you can combat it.  At Perfect Connections, Inc. we can help protect you and your business from untrustworthy employees.  We’ve been providing security system solutions to businesses throughout northern and central New Jersey for over 20 years.  While a comprehensive security system can’t detect an employee’s honesty, it can help prevent employees from stealing as the chances they might get caught increase.  We don’t advocate blindly mistrusting your employees, we simply provide effective equipment to help prevent theft and loss.

When employees steal, they aren’t always stealing cash.  Some of the most common assets stolen are time, supplies, cash, merchandise or company property, and company information.  Time may not be a tangible asset, but it is often abused or stolen.  Think about the employees that consistently show up late or take extended breaks and never make up the time.  When you have one person doing this it doesn’t seem like a big deal, but looking at the big picture the numbers add up, and fast.  It’s not only companies paying people who aren’t actually working their designated hours, it’s the loss of work and potential business for a company.  This has an effect on the entire nation economically.

According to The U.S. Chamber of Commerce employee theft costs American businesses anywhere from $20 billion to $40 billion annually.  That’s capital that could be reinvested in a company to create new jobs, grow, and/or innovate.  This doesn’t mean people don’t deserve breaks or time off, it’s just pointing out the fact that if given the opportunity some people will take advantage.  In fact 75% of all employees will steal at least once and some will become repeat offenders.  The employees that steal are not always the ones you’d expect either.  Surprisingly (or unsurprisingly) managers account for 55% of all employee theft.  How do they get away with it?  They’re typically in a position where they are well trusted, hence being a manager.

So what can be done to combat the damaging effects of employee theft?  Fortunately there are some guidelines you can follow as an employer to help prevent, or at the very least, limit employee theft.  Caron Beesley for the U.S. Small Business Association has 6 general tips and they are as follows: pre-employment background checks, check candidate references, communicate conduct guidelines, don’t be afraid to audit, recognize the signs, and set the management tone.

Running a background check is a good idea for any employer, it’ll provide insight into an applicant’s history that may not come through in an interview.  Checking references will help speak to a candidate’s character from sources other than the candidate themselves.  Being upfront about your expectations for employee conduct will set the stage for ethical behavior, this can be a code of conduct that is reviewed upon employee orientation, and companywide on an annual basis.  Auditing your business is an effective way to discover theft and fraud especially because it’s performed by a third party and unbiased professional.  Recognizing the signs can be a little more challenging, but according to Beesly there are some behaviors to take note of.  You should be conscious of an employee not taking any vacation time, a change in normal behavior, being overly protective of ones work, disappearing financial records, and unexplained debt.  Lastly, setting the management tone will let your employees know you take your business seriously.

Aside from company policies and expected behaviors, installing a comprehensive security system can help deter fraud and employee theft.  Surveillance equipment can prevent theft and catch it in action.  If employees know their environment is being monitored they’re less likely to attempt theft for the possibility of being caught.  Using some sort of access control within your facility can help by limiting who can enter and sometimes exit specific areas.  This would allow you to store items of high value or importance and limit who can access them via key fobs, swipe cards, or other credentials.  Here at Perfect Connections, Inc. we understand no system is perfect or infallible, but they can help significantly decrease the chances of substantial loss and/or damage.  Our team of experts has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  Call on our specialists to help you protect your business so you can get back to what’s most important, running it!

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Kev-shine-Flickr-Creative Commons

Is Your Business Prepared For An Emergency?

Creative CommonsNo business is immune to risk or unpredictable circumstances.  In an emergency, often times, there’s an influx of panic for those involved.  Our dedicated and hardworking emergency responders-firefighters, EMTs, ambulance, and police-are the ones who keep a strong front and are prepared to help us through these tough situations.  As a business owner wouldn’t it be great if there was a way to lessen the constant fear of unknown threats to your organization?  Fortunately, there is something you can do for your business, your employees, yourself, and the responders.  Be prepared and have a plan.

At Perfect Connections, Inc. we believe instead of being fearful or worrisome about the unknown, you should be as prepared as possible for it.  Part of being prepared is maintaining proper security of your organization.  We’ve been providing peace of mind to businesses throughout northern and central New Jersey since 1992 by installing comprehensive security systems.  A security system is so much more than just a video camera and alarm code.  To truly be protected a system should include a monitoring service, some form of access control, video surveillance, fire and burglar alarms, and carbon monoxide detectors.  While the physical aspect of a security system offers protection and prevention, it is also important to have some form of emergency protocol within your organization.

What is your plan and why do you need one?

No one enjoys thinking about the potential disasters that could occur in our daily lives, but they are, no matter how unsavory, a part of life.  If you haven’t already, you should work with your company, local authorities, and maybe a risk management firm to come up with an emergency plan.  The world is an unpredictable place, even if your business is located in a safe area, there are no guarantees.  According to Kelly Jenkins, Director of Emergency Management for Lawnwood Regional Medical Center and Heart Institute in Florida, “The worst possible scenario is to be not prepared.”  Having some sort of contingency plan is important because it’ll help you recover quicker and reinforce customer’s confidence in the integrity of your business.  It’s important to maintain that competitive edge that drives the workforce, as they say, “The show must go on!”

It’s not just being prepared for a disaster, it’s how you continue operation after as well, sometimes referred to as a BC (Business Continuity) plan.  What is your BC plan and how do you come up with it?  According to Kim Lindros and Ed Tittel for CIO, there are 6 general steps in developing a BC plan, and they are as follows:

  1. Identify the scope of the plan.
  2. Identify key business areas.
  3. Identify critical functions.
  4. Identify dependencies between various business areas and functions.
  5. Determine acceptable downtime for each critical function.
  6. Create a plan to maintain operations.

Once you have a plan the best way to ensure everyone is on board and prepared is to test it.  What good is a plan if no one knows how to use it?  Have frequent drills so you, your employees, and all personnel understand what they need to do in the event of an emergency.  Testing and running drills will eventually create more of a “muscle memory” response so precious time isn’t wasted trying to figure out which steps to take.  If you’re stuck on where to begin consider hiring a professional and reference online guidelines like the Planning and Responding to Workplace Emergencies provided by OSHA (Occupational Safety & Health Administration).

How does having a security system affect emergency situations?

As a business owner you want to do everything in your power to protect your organization.  Having a comprehensive security system installed may be the catalyst in a better defense.  How will the system affect circumstances during an emergency?  Imagine there is a major fire at work.  As part of your comprehensive security system you have a functional fire alarm and monitoring service.  The alarm sounds sending a signal to the monitoring station which then informs local emergency responders.  Luckily, due to the speedy response time, firefighters were able to quickly extinguish the flames minimizing property damage, costing you less in repairs.  But most importantly you, your staff, and customers were able to exit the facility safely.

Now, without getting too graphic, imagine the shooter scenario.  Unfortunately, it’s become an all too common occurrence in our daily lives.  So how can a security system help in this type of situation?  Your access control system and surveillance come into play.  Because you had a swipe card access control system installed at all entries the shooter cannot get into your facility as they do not possess the required credentials.  With your surveillance equipment you were able to capture footage of the deviant.  The footage helped identify the criminal and authorities were able to detain him/her.  This is a best case scenario, but you can see how certain security features, when combined, can be extremely effective in deterring catastrophe.

There are infinite disastrous possibilities that can affect your business, but you can’t spend every minute of every day worrying about them.  Instead create a plan and be as prepared as possible.  If you are considering a security system for your business for the first time or need an assessment of your current situation do not hesitate to call on our experts at Perfect Connections, Inc..  Our knowledgeable and experienced team has been providing security system solutions to northern and central New Jersey businesses for over 20 years.  We believe in helping you protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Creative Commons