16
SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail Items & Parcels (incl. Biohazard Materials) Increased Threats (Local & Global) 1

SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

Embed Size (px)

Citation preview

Page 1: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

SECURITY PREPAREDNESS

PROTOCOLS• Active Shooter (single/multiple attackers)• Telephone Bomb Threats

• Suspicious Items (Improvised Explosives)

• Suspicious Mail Items & Parcels (incl. Biohazard Materials)

• Increased Threats (Local & Global)

1

Page 2: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

Active Shooter• One or more individuals enter a

premises and attack people randomly.• The attackers will continue until they

are stopped or run out of ammunition.• Possible motives: • Political ideologies• Vengeance towards a specific person

or institution, mental disorders, • Family/social disputes related to

people working in the targeted area, etc.

• Lockdown: Hide in a room, turn off lights, lock & block doors, silence everything and everyone. 2

Page 3: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

3

How do we know an incident is happening?

• You may hear Gunshots, People yelling and running everywhere…

Page 4: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

4

What to do?

• If you CAN EVACUATE safely:

•Leave everything behind and calmly evacuate to the nearest exit. Once outside make your way to the predetermined safe gathering area.

• If you do not have a designated area - MOVE AWAY from the building and out of sight as fast as possible.

• If you cannot see the building, no one in the building can see you!

Page 5: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

5

Who to trust? • If you see the Police:• stay calm and do not jump at them

• ensure your hands are empty and visible

•FOLLOW POLICE INSTRUCTIONS

• Police officers will be suspicious of everyone!

Page 6: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

6

What to do if you cannot evacuate

safely?LOCKDOWN:• If you are located in a room with a door, and

ONLY if it is safe to do so, quickly open the door and look for innocent bystanders in the corridor and bring them in for shelter.

• Close and LOCK the door and barricade it if possible (use furniture, cabinets, etc.)

Page 7: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

Lockdown Protocol• Cover any internal windows facing the corridor.

• Indicate how many people are with you and your

room/office number on a piece of paper and tape

it to a window facing the street.

• Ignore the fire alarm - unless you see obvious

signs of fire in your immediate surroundings.

• Ignore any external instructions.

• If you see the Police, STAY CALM.

7

Page 8: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

8

Lockdown Protocol

• Silence everything (cell phones, music, etc.)

• Silence everyone – try and calm people and tell them that help is on the way – no talking.

• Tell everyone to lay down on the floor away from the door, in a blind spot, behind furniture if possible.

Page 9: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

Who to trust? Is it over?

• The Police first priority is to neutralize the threat.

• Dealing with injuries and evacuation is secondary.

• If you are not sure about leaving your

hiding spot, ask them to provide ID and

take your time.9

Page 10: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

Quick Summary• You hear gunshots, people yelling and running everywhere…

• Leave everything behind, if possible calmly evacuate to the

nearest exit.

• Get as far away from the building and make sure you can’t see it.

• If you can’t evacuate, hide in a room, turn off the lights, lock &

block doors, silence everything & everyone.

• Notify 911 of the situation.

• If the fire alarm rings, ignore it unless there are real signs of fire.

What to do when the police arrive?

• Stay hidden or on the ground and don’t move.

• Tell them where you are, name yourself, don’t gesture abruptly

and keep your hands visible and empty.

• FOLLOW THEIR INSTRUCTIONS. 10

Page 11: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

Getting ready…

11

Page 13: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

Telephone Bomb Threat Report

13

Page 14: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

Telephone Bomb Threat Report

14

Page 15: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

• Any item that is delivered directly or via a 3rd party and that may contain unsafe materials.

• Objective: to install a controlled screening process to safely handle all incoming mail/items from the moment they arrive into our environment up until they are opened by the designated recipient - while minimizing any associated disruptions.

15

Suspicious Mail

Page 16: SECURITY PREPAREDNESS PROTOCOLS Active Shooter (single/multiple attackers) Telephone Bomb Threats Suspicious Items (Improvised Explosives) Suspicious Mail

16