Threat and Vulnerability Assessment Module 8 Part 2
|
|
- Stuart Hampton
- 5 years ago
- Views:
Transcription
1 Threat and Vulnerability Assessment Module 8 Part 2 Michael J. Hinske Principal, School Safety Coordinator Big Foot Union High School WSSCA Past President
2 Speakers Info Michael J. Hinske, Principal, School Safety Coordinator, Big Foot Union High School, Walworth, OJA-Homeland Security Planning Team, Safe Havens International Trainer, Past President WSSCA
3 Lesson Objective and Learning Target Upon completion of the presentation students will: 1. Understand the importance of a Vulnerability Assessment 2. Identify areas of vulnerability from an internal, external, and facility perspective. 3. Prepare plans for mitigating vulnerability. 4. Identify inspection and observational practices consistent with school safety. 5. Perform a school based analysis from data collected on internal vulnerability. 6. Identify best practices in building and design of school facilities and placement of security devices.
4 Why Identify Threats and Vulnerability? School safety and crisis plans must adhere to identified threats and vulnerabilities: Provide for a central focus on likely events Does not waste time and effort training for events unlikely to occur Allows for mitigation to occur where applicable Creates a system for understanding how the surroundings impact the school and community Forces multi-agency collaboration and plan development.
5 Preliminary Activity #1 1. Take a minute and think about your school and its place in the community. a. Can you identify at least 3 external threats or vulnerabilities present in the community? b. Can you identify at least three external threats present on your school site? c. Can you identify at least 5 internal threats or vulnerabilities present in your school?
6 What is Vulnerability A person or institution is vulnerable because they are: Susceptible to physical or emotional injury Susceptible to attack
7 Vulnerability Assessment A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities (to) a system. Identifying the vulnerabilities or potential threats to each resource Mitigating or eliminating the most serious vulnerabilities for the most valuable resources US Department of Energy 2002
8 External Vulnerability + Threat Identify external threats present in the community or surrounding area that may likely impact the school: Off site external include: hazmat transport in adjacent area to school (train and truck) factories and materials present in factories traffic patterns including heavy truck traffic utility lines and transfer points utility plants hazardous materials stored near the school site including LP, gasoline, chemicals, etc.. shops or stores that sell dangerous weapons known drug selling points known gang hangouts and areas of congregation biological, radiological, and chemical attacks
9 Aerial View 1
10 Aerial View 2
11 Aerial View 3
12 External Vulnerability + Threat 1. On site factors include: a. Traffic control including vehicle and traffic patterns and parking b. Bus traffic and crosswalks c. Pedestrian traffic on site and in adjacent neighborhood d. Integration of pedestrian traffic and vehicles e. Trees and shrub placement f. Access points to roof g. Placement of gas and electric utility boxes and shutoffs, etc h. Entrance and access to school i. Placement and securing of dumpsters
13 External Vulnerability + Threat On site factors include: (Cont) j. Chemical and hazardous material storage k. Underground storage tanks l. Lines of sight during winter and snow removal operations m. Exit locations and clearing of entryways n. Drainage ditches o. Anything that impacts natural surveillance p. Vending machines q. District owned transportation
14 External Vulnerability and Mother Nature Weather related issues: Tornado Straight line winds Flooding Blizzards Severe cold Severe heat Thunderstorms and electrical discharge
15 Internal Vulnerability Internal vulnerabilities include: Facility Related Chemical storage locations Paper product storage locations Utility shutoff locations Stage curtains and fireproof materials Electrical panels Boiler rooms Network Hubs and Switch Rooms
16 Internal Vulnerability Internal vulnerabilities include: Facility Related (Cont) Kitchens and food storage locations Classroom and/or school moveable furniture Weight rooms and pools Door entry and door identification Unsecured classroom Catwalks Confined Space Entry Locations
17 Internal Vulnerability Internal vulnerabilities include: Incident Type Specific- General Fire Gas leak Explosion Bomb Threat Spilled chemicals Food borne illness Pandemic Flu or Pandemic Illness
18 Internal Vulnerability Internal Vulnerability- Student related include: Harassment- verbal, physical, written and electronic Fights Large group altercations Drugs and alcohol Gangs Bomb threats and threats of violence Medical emergency Slips and falls
19 How do we mitigate Vulnerability? Adhere to and develop Crime Prevention Through Environmental Design (CPTED)
20 CPTED- Strategies Natural Surveillance Maximize visibility of people, parking areas, windows, doors, sidewalks, bike racks. Increase lighting as necessary May mean redesign of entryways to schools. No blind entry.
21 CPTED- Strategies Territorial Reinforcement- ways to designate a change in space from public to private Gated entry areas Plantings Paint Signage Pavement
22 CPTED- Strategies Natural Access Control- Denying access to areas without sightlines. Use sidewalks or other means to funnel or channel people to desired locations and away from undesired areas Use physical or man made barriers to maintain safety and keep people away from undesired areas.
23 CPTED- Strategies Target Hardening- Prohibiting public entry Bollards Access Control Systems Window and Door Locks Concrete Flower Boxes and Barriers
24 How do we mitigate Vulnerability? Prepare policies and procedures Door locking, secure entry, and access control General rules for school safety and occupancy Facility inspection School supervision Transportation inspection and driver certification Identification of unsafe conditions Locker control and inspection Inspection of Vehicles and lockers on campus Signage to alert of inspection
25 How do we mitigate Vulnerability? Identify Best Practices- Chemical and Chemical Storage Chemical storage containers meet requirements Inventory of all chemical materials Require MSDS and locate MSDS proximally Remove unnecessary chemicals and unsafe materials Separate acids
26 How do we mitigate Vulnerability? Identify Best Practices- Chemical and Chemical Storage (Cont) Identify and label all containers Train staff in safe use of chemicals Make PPE required Chain gas cylinders securely Have chemical containment systems available Radon- Periodic check and make repairs/venting as necessary
27 How do we mitigate Vulnerability? Identify Best Practice- Access Control Identify each exit/entrance by number or letter Require visitors entry only after being screened Identify and control keys and key systems Require visitors to wear ID badges Maintain ability to lock down exterior doors without physical presence Train staff to confront or intercede with unrecognized persons in the building Post signage regarding visitors Teach staff regarding procedures for access control and facility use
28 How do we mitigate Vulnerability? Identify Best Practice- Incident Plan Weather related Identify likely events- Tornado, flood etc Identify shelter locations and post directions for use Consult building architect/engineer to determine best and safest locations. Clear shelter locations with emergency services Identify communications plan and backup plans for multi jurisdictional communications Identify alternate evacuation locations and family reunification protocols.
29 How do we mitigate Vulnerability? Identify Best Practice- Incident Plan Non Weather Related Threats of violence- shooting in school, weapon on campus, armed intruder, armed standoff outside of school, bomb threat, biological, radiological, chemical attack, kidnapping, assault, sexual assault, fight, large group altercation, Medical emergency- illness, injury, death Accident- traffic on site, traffic off site, death due to accident Other- graffiti, harassment, discrimination
30 How do we mitigate Vulnerability? Identify in school records on discipline Review discipline logs for patterns of behavior- Incident type related Review discipline logs for patterns of behavior- Location, location, location Review discipline logs for patterns of behavior- Time related Establish proactive practices Supervision- proximal and general Establish policy/procedure necessary to combat
31 How do we mitigate Vulnerability? Develop a comprehensive training plan Create and identify a crisis team Identify and train a school safety committee Train all staff yearly on plan- Crisis management and emergency operations- Document training Blood Borne Pathogen- Document training Conduct fire drills each month using various scenariosblocked exits, etc.. Conduct lockdown drills Conduct secure evacuation drills Practice full attendance and accountability exercise Conduct locker searches- practice safe search- Gloves and other PPE as necessary- Based on what is being searched for
32 How do we mitigate Vulnerability? Develop a comprehensive training plan Periodically review plans and bring staff up to date on current status of events Develop a plan for training substitutes Train specific staff in specialized areas per Com. 32 and OSHA- Science/Ag, Tech Ed, Art, FACE and School Kitchen, New Employees, Custodial and B/G, Others as necessary- Document training Conduct table top and or functional drills with safety team and responders
33 How do we mitigate Vulnerability? General Aspects Adopt a safety first attitude Routinely implement inspections with accurate records Assign daily walk around duties- observe and correct Inside Outside Remove external barriers to supervision Remove brush/rocks, anything that can impact supervision or building entry Train with first responders Don t rely on Technology as a means to an end. Technology is a tool.
34 People Mitigate Vulnerability Nothing beats good old people power. Want to mitigate vulnerabilitywork with your people. Secretaries, Bus Drivers, Teachers, Aides, Custodians, Administrators, Students, Parents, Cooks etc
35 Photo Session
36 Access Control
37 Interior Security Off Hours
38 Chemical Storage
39 Chemical Storage- What s Missing?
40 Safety Ready to Go!
41 Electrical Storage Vaults- What s wrong with picture 1?
42 Spill Control and Locked Storage
43 Network Security- Doors Locked and Secure?
44 Compressed Gas Cylinder Storage
45 Custodial Closets and Switch Locations
46 The Scene Shop
47 Airlocks and Door Security
48 School Owned Transportation
49 Utility Access and Guarding Signage to the Roof
50 Dumpsters Secured and Locked
51 Signage Upon Entering Grounds
52 Bike Rack- Problem? The Walkway
53 Line of Sight for Traffic Control
54 Line of Sight 2
55 Exercise 2 You are the new safety coordinator of a high school with a serious safety issue that is student related. Look at worksheet two and develop a plan of attack for dealing with the safety issue present. Your facility has no physical security or security technology in place.
56 Exercise 2 Include a plan for technology upgrades and placement of technology in the facility. Include a plan for policies and procedures necessary to assist you in the safety of your school.
57 Thanks for Your Participation and Engagement Remember it is all about the kids and the safety of our greatest assets!
School Safety & Security: Priorities for Facilities
School Safety & Security: Priorities for Facilities Speakers Brett Hobza, AIA DLR Group Principal/K-12 Sector Leader Phil Wentz Tigard-Tualatin SD Facilities Manager Clem Spenner Willamette ESD Threat
More informationNIBS Building Innovation 2014
NIBS Building Innovation 2014 Integrated Rapid Visual Screening Process to Assess and Design Safe Schools Mila Kennett Department of Homeland Security Science and Technology Resilient Systems Division
More informationATTACHMENT 3 ZAB Page 1 of 8. The police department feels that the expanded use and hours are okay with the recommended security upgrades.
Page 1 of 8 From: White, Byron E. Sent: Wednesday, April 24, 2013 8:28 AM To: Greene, Elizabeth Subject: Re: 1799 University comments The police department feels that the expanded use and hours are okay
More informationEMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY
EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale
More informationNATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC
NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable
More informationFACILITY COMPONENTS - MIDDLE SCHOOL
SITE AREAS Parking and Access - Buses 4.0 2.0 0.59 Parking and Access - Serv. / Delivery 3.0 1.0 0.22 Parking and Access - Staff 4.0 3.0 0.89 Parking and Access - Visitors 4.0 3.0 0.89 Parking and Access
More informationBest Practices for Campus Security. January 26, 2017
Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner
More informationBaker Intermediate School Phase II: School Safety Report
Baker Intermediate School Phase II: School Safety Report 2017-2018 Phase II: School Safety Report Josh Mounts 1645 Martin Luther King Jr Dr Winchester, Kentucky, 40391-2812 United States of America Last
More informationHUMANITARIAN COORDINATION TRAINING. Safety & Security in Humanitarian Coordination
HUMANITARIAN COORDINATION TRAINING Safety & Security in Humanitarian Coordination Pre-Departure Security Considerations Make appointment for pre-departure security briefing with your organization Research
More informationMAYS LANDING CAMPUS SECURITY
SECURITY Clery Act Public Crime Log From 1/1/2018 To 9/18/2018 : C BUILDING Date/Time Reported: 1/3/2018 1530 Incident Occurred Between: 1/3/2018 1530 and UNKNOWN Case #: 0120180103-000001 Int. Ref. #:
More informationPrepare your Emergency respons, continuity plan, recovery plan
Prepare your Emergency respons, continuity plan, recovery plan Panel Discussion with PortAventura,Europa Park, Disneyland Paris,Liseberg,the Safety Committee members with Q & A from attendees Septembre
More informationMHCC Emergency Notification System (ENS) Protocols
MHCC Emergency Notification System (ENS) Protocols Introduction MHCC has an Emergency Notification System (ENS) with multi communication capabilities. MHCC s ENS is intended to rapidly disseminate emergency
More informationInjury & Illness. Yes No
Safety Shield Injury & Illness 66. Has the company trained employees about how to report an injury? If yes, please provide the policy AND the training sign-in sheet in the supporting documentation. 67.
More informationHow AlienVault ICS SIEM Supports Compliance with CFATS
How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal
More informationIndex: SUMMIT TITLES:
Index: Accident Investigation Air Emissions Ammonia Safety Asbestos Behavior-Based Safety Bloodborne Pathogens Chemical Safety Confined Spaces Construction Safety Crane Safety Driver Safety Electrical
More informationKenneth Brown, Facilitator
Kenneth Brown, Facilitator 1 Our CERTs consist of individual residents, neighborhood watches and associations, churches and commercial employees. The idea is engage the entire community. 2 Memphis Metro
More informationGlobal Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.
Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,
More informationFive Benefits of a Visitor Management System
Five Benefits of a Visitor Management System Pencil and Paper Sign-In Sheets Are No Longer Enough It is both amazing and disturbing that more than 80% of K-12 schools in the United States still rely on
More informationBCP At Bangkok Bank, Thailand
BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in
More informationEffective Leadership, Role of Workers & Labor Organizations
Effective Leadership, Role of Workers & Labor Organizations International Regulators Offshore Safety Conference December 6, 2007 safety@usw.org 412.562.2581 Why is the USW involved in health & safety?
More informationCOPYRIGHTED MATERIAL. Contents. xv xxi. Preface About the Web Site
Preface About the Web Site CHAPTER 1 Business Continuity Management Plan 1 Crisis Management 4 The Value 5 Common Failings 7 Business Continuity Goals 9 Defining a Crisis 10 Mapping Risks 11 Critical Dependencies
More informationTEA, Inc. CORPORATE HEALTH AND SAFETY PROGRAM
CORPORATE HEALTH AND SAFETY PROGRAM Updated June 24, 2013 August 12, 2013 Prepared by 10636 Linkwood Court Baton Rouge, Louisiana 70810 Phone: (225) 767-3880 Fax: (225) 767-3883 TABLE OF CONTENTS Section
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Hometown Security Overview Minnesota Festivals and Events Association 5 November, 018
More informationFighting Hunger Worldwide. WFP Field Security Keeping you safe & secure
Fighting Hunger Worldwide WFP Field Security Keeping you safe & secure April 2016 Safety and security: a top priority In the field, our security risk management personnel provide specific knowledge of
More informationPeople Assets Reputation
Welcome to Spearpoint International LLC The risks faced by global business are greater now than ever, the increasing danger from terrorism and the ever present threat from organized and opportunistic crime
More informationThe Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Measures for Public Gatherings Western Region Healthcare Emergency Preparedness
More informationJuly 31, University of Maryland Emergency Management Faculty Staff Essentials
July 31, 2015 University of Maryland Emergency Management Faculty Staff Essentials What is Emergency Management? 2 What is Emergency Management? The process of preparing for, mitigating, responding to
More information2017 AGC ACE Awards. Category 4: Best Building Project - Specialty Contractor (Under $2 Million) Contractor: Sturgeon Electric Company, Inc.
2017 AGC ACE Awards Category 4: Best Building Project - Specialty Contractor (Under $2 Million) Contractor: Sturgeon Electric Company, Inc. Project Name: Memorial Union Electrical Services Upgrades (ASU-MU)
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationFacilities Department Town of Duxbury, MA
Facilities Department Town of Duxbury, MA FY18 Capital Project Request Presentation To The Board of Selectmen, Finance, & Fiscal Advisory Committee s Duxbury Senior Center November 14, 2016 Prepared and
More informationKris Lawrence, Propel Insurance Annual Conference, Spokane WA
Kris Lawrence, Propel Insurance 2017 Annual Conference, Spokane WA How Injuries Occur Falls from equipment onto ground Impacts by swings & other moving equipment Contact with protrusions, pinch points,
More informationUpdate on 2018 Security Goal Plans and Strategies
Update on 2018 Security Goal Plans and Strategies City of Dallas Public Safety and Criminal Justice Committee January 8, 2018 Chief James D. Spiller Dallas Area Rapid Transit 1 AGENDA DART Board of Directors
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationCERT (COMMUNITY EMERGENCY RESPONSE TEAM)
CERT (COMMUNITY EMERGENCY RESPONSE TEAM) & Disaster Preparation Michael Deaver, KG5JBJ What is CERT? Community Emergency Response Team (CERT) FEMA (Federal Emergency Management Agency) Volunteer emergency
More informationNuclear Power Plant Security
Nuclear Power Plant Security Plant Security s Primary Mission Nuclear Plant Safety and Security All plants have comprehensive measures for safety and security Comprehensive emergency and security plans
More informationSolving Safety and Security Concerns at Meetings and Events
Solving Safety and Security Concerns at Meetings and Events Chris Gernentz Safety and Security, Carlson Rezidor Hotel Group 22 years in Safety and Security Hospitality, manufacturing, petro chem, medical.
More informationTHE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT
THE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson
More informationACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response
ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become
More informationInfrastructure & Building Risk Assessment on New and Existing Buildings
Infrastructure & Building Risk Assessment on New and Existing Buildings E. Scott Tezak, PE, BSCP Security Practice Lead, TRC Companies Lawrence Fitzgerald, CPP, PSP Security Group Leader, TRC Companies
More informationData Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)
Data Centre Security Presented by: M. Javed Wadood Managing Director (MEA) EPI history and global locations UK origin, 1987 Singapore office, 1999 9 EPI offices worldwide Global partner network spanning
More informationUlster University Policy Cover Sheet
Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective
More informationCompliance with ISPS and The Maritime Transportation Security Act of 2002
Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview
More informationPresented by Joe Burns Kentucky Rural Water Association July 19, 2005
Infrastructure Security for Public Water and Wastewater Utilities Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Public Health Security and Bioterrorism Preparedness and Response
More informationDisaster Support Hubs
Disaster Support Hubs Earthquake Preparedness Strategy Update - Priority Action #10 Update to Mayor and Council: April 5, 2016 Agenda The Purpose of this presentation is to Provide a brief update on the
More informationdesktop Security Rev 3.0
desktop Security Rev 3.0 Technology that works for you. Imagine having the ability to automate your establishment s safety and security procedures with the simple click of a button. Even better, imagine
More informationV A Physical Security Assessments LESSONS LEARNED
1 V A Physical Security Assessments LESSONS LEARNED 2 Program Goals What threats should be guarded against? How best to evaluate healthcare, cemetery, as well as office facilities against these threats?
More informationLaguna Honda Hospital and Rehabilitation Center. Security Management Plan
Laguna Honda Hospital and Rehabilitation Center Security Management Plan 2018-2019 REFERENCES California Code of Regulations, Title 8, Sections 8 CCR 3203 et seq. California Code of Regulations, Title
More informationGIS in Situational and Operational Awareness: Supporting Public Safety from the Operations Center to the Field
GIS in Situational and Operational Awareness: Supporting Public Safety from the Operations Center to the Field Glasgow Bombings- June 2007 Law Enforcement, Public Safety and Homeland Security Organizations
More informationDistracted Work. Kentucky Crushed Stone Association - Annual Safety & Education Seminar February Robert Jameson, Central Mine Services, Inc.
Distracted Work Kentucky Crushed Stone Association - Annual Safety & Education Seminar February 2018 Robert Jameson, Central Mine Services, Inc. Has anyone else seen people like this lately? Seems like
More informationRESILIENCY MESSAGE MAPS
Prepared by: RESILIENCY MESSAGE MAPS Prepared for: (Company XYZ) MESSAGE CONTENT SAMPLES: 1. CONTACT INFORMATION - UPDATE REQUEST 2. COMMUNICATIONS TEST 3. HURRICANE - COMMUNICATIONS TEST 4. CONFERENCE
More informationHeartland s. About Heartland
Heartland s Evolution of Business Continuity About Heartland About Heartland One of the nation s largest payment processors Products Heartland Landscape 50 + Facilities Employees, 4,600 + USA Processing,
More informationINHERENT SECURITY: PROTECTING PROCESS PLANTS AGAINST THREATS
INHERENT SEURITY: PROTETING PROESS PLANTS AGAINST THREATS by Paul Baybutt Primatech Inc., 50 Northwoods Blvd., olumbus, OH 43235 paulb@primatech.com This paper has been accepted for publication in hemical
More informationNIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA
NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY
More informationSECURITY PLAN. Library Bar 630 W. 6 th Street, Suite 116A Los Angeles, California 90017
SECURITY PLAN Library Bar 630 W. 6 th Street, Suite 116A Los Angeles, California 90017 Owned and Operated by: Sixth and Hope, LLC Michael Leko & William Shamlian Security plan prepared by: Elizabeth Peterson
More informationProperty Maintenance & Operations Manual Training
Property Maintenance & Operations Manual Training Introduction to Property Operations Management and Building Security October 16, 2007 Property Maintenance & Operations Manual Training April 12, 2007
More informationGuidance for Accident Reporting
Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need
More informationPhysical and Environmental Security Policy Document Number: OIL-IS-POL-PES
Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Document Details Title Description Version 1.0 Author Classification Physical and Environmental Security Policy Physical and Environmental
More informationEmergencies: Protecting Staff & Assets. Presented By: Tom Heebner, CSP, ARM, ABCP AVP / Risk Consultant HUB International Limited
Emergencies: Protecting Staff & Assets Presented By: Tom Heebner, CSP, ARM, ABCP AVP / Risk Consultant HUB International Limited Agenda Why is Planning Important? Lessons Learned From Recent Events The
More informationWashington Metropolitan Area Transit Authority Board Action/Information Summary
Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 200972 Resolution: Yes No TITLE: MTPD 2014 Part I Crime Report, January - June PRESENTATION
More informationManagement. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,
Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface
More informationUniversity at Buffalo Campus Mail Services
University at Buffalo Campus Mail Services Standard Operating Procedures Guidelines for Handling Mail 9/04 The University at Buffalo Campus Mail operations is located on the University s North Campus,
More informationPort Facility Cyber Security
International Port Security Program Port Facility Cyber Security Cyber Security and Port Facility MAR'01 1 Security Plans (PFSP) Lesson Topics Purpose of the PFSP Developing the PFSP Role of Facility Personnel
More informationLocal Government Disaster Planning and what can be learned from it.
Local Government Disaster Planning and what can be learned from it. Emergency Operations Plans Emergency Support Functi0ns: ESF-1 ESF-2 ESF-3 ESF-4 ESF-5 ESF-6 ESF-7 Transportation Communications Public
More informationInternational Travel Safety. Business Resilience
International Travel Safety Business Resilience 1 Preparation Proactive Mindset Resilience The Business resilience program is focused on empowering business activity in high-risk locations and safeguarding
More informationIT Service Delivery And Support Week Eight - Data Center
IT Service Delivery And Support Week Eight - Data Center IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Data Center 101 Facility-Based Controls Physical security HVAC Fire Suppression
More informationBEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate
BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME Brian Michael Jenkins Research Associate Mineta Transportation Institute January 14, 2002 Contemporary
More informationInformation Services IT Security Policies L. Network Management
Information Services IT Security Policies L. Network Management Version 1.1 Last updated: 11th August 2010 Approved by Directorate: 2nd July 2009 Review date: 1st August 2011 Primary owner of security
More informationWORKPLACE VIOLENCE HAZARDS INSPECTION FORM 1
WORKPLACE VIOLENCE HAZARDS INSPECTION FORM 1 Date: Conducted By: Campus: Building: Location: Parking Lot Are the entrances and exits well marked? Does the lot have signs with security reminders (e.g. lock
More informationPASS Your HMA / HMO Exam Incident Management
1) Who assumes command at a haz mat incident? A) The driver of the first-arriving squad truck B) The first person on the scene or the ranking individual of the first company on the scene C) The first-arriving
More informationSecurity Management Seminar
SSID PSAV_Event_Solutions Passcode NERC0001 Security Management Seminar Ross Johnson, CPP Capital Power Edmonton, Alberta Security Management Programs Agenda Security Risk Management Design Basis Threat
More informationChemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and
Chemical Facility Anti-Terrorism Standards T. Ted Cromwell Sr. Director, Security and NJ ELG Operations Meeting Today s Presentation ACC Action Major Rule Components Select Risk-Based Performance Standards
More informationData Center Access Policies and Procedures
Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data
More informationSite Visitor Requirements Practice
Health & Safety Site Visitor Requirements Practice Content Owner Custodian H&S Discipline Program COMS Document Number Manager, Health and Safety Solutions Health and Safety Solutions H&S Programs & Projects
More informationworkplace hazards inspection form
workplace hazards inspection form Workplace Violence Company: Location: Floor Section: Date: Building: Name: (optional) Parking Lot Are the entrances and exits well marked? Does the lot have signs with
More informationUNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017
UNC Campus Security Initiatives Update Business Affairs Committee May 9, 2017 UNC Campus Security Initiative In August 2013, President Ross asked for a review of current security practices, an assessment
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationDepartment of Homeland Security
Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency
More informationDisaster Preparedness Community Emergency Response Team
Disaster Preparedness Community Emergency Response Team Berkeley CERT Disaster Preparedness Unit Objectives Describe the types of hazards to which your community is vulnerable Describe the functions of
More informationPosition Title: H V A C T E C H N I C I A N. G.E.D. or High School Diploma required, an Associate s Degree is preferred.
Location Beeville-Primary; All Campuses Hours 40 hours/week minimum Salary $40,000-$50,000 annual, based on KSAs Job Classification Exempt Security Sensitive Y e s Division Physical Plant Department Physical
More informationHealth Facilities and Utility Providers
Health Facilities and Utility Providers Strengthening the Partnership Ann Steeves, CEO HC-EMI November 2017 National Healthcare Coalition Preparedness Conference 2017 HC-EMI. All rights reserved. 1 Learning
More informationUF CEMP Support Group Annex: Public Safety
UF CEMP Support Group Annex: Public Safety Lead Representatives University of Supporting Departments External Partners Enrollment Management Shands Hospital Safety & Security Alachua County Emergency Management
More informationSection 1 Metrics: Community Adoption
FY07 NIMS Compliance Metrics: Local/Tribal Section 1 Metrics: Community Adoption Compliance Requirement: Adopt NIMS at the community level for all government departments and agencies; as well as promote
More informationSituational Crime Prevention in Anti-Terrorism Efforts
NASSAU COUNTY POLICE DEPARTMENT Situational Crime Prevention in Anti-Terrorism Efforts 20 th Annual Problem Oriented Policing Conference Tuesday September 22, 2009 Thomas R. Suozzi County Executive Lawrence
More informationPhysical and Environmental Security Standards
Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...
More informationPage G Wilkin County Multi-Hazard Mitigation Plan, 2017
Multi-Hazard Plan, 2017 Table G - 3. Actions Identified by the () (From Master Action Chart) Action Comments 2 All-Hazards 5 All-Hazards 6 All-Hazards Local Planning & Regulations Address lack of wireless
More informationMid America Rescue Company
Mid America Rescue Company NATIONAL TORNADO SYMPOSIUM 2017 www.midamericarescue.com PRESENTATION BY: GREG MERRELL MAJOR, OKC FIRE DEPARTMENT TASK FORCE LEADER, OK-TF 1 RESCUE SPECIALIST, OK-TF 1 BRIAN
More informationWarren County Emergency Management Agency. 500 Justice Drive Lebanon, Ohio
Warren County Emergency Management Agency 500 Justice Drive Lebanon, Ohio 513 695 1313 Fax 513 695 1715 1715 Warren County 399.63 Square Miles Who We Serve Population 210,712 76,944 Housing Units Massive
More informationEast Falls Campus. Active Shooter. Bob Stack Security Operations Manager
East Falls Campus Active Shooter Bob Stack Security Operations Manager Issues: Initial Notification of an Incident and continued Communication during the Incident 40+ Buildings spread of 100+ acres Public
More informationEmergency Response for Demand Response Transportation Systems
Emergency Response for Demand Response Transportation Systems Trapeze Rapid Response North America Copyright 2011 Trapeze Software Inc., its subsidiaries and affiliates. All rights reserved. March 22,
More informationAged Care Security Solutions. security.gallagher.com
Aged Care Security Solutions security.gallagher.com Aged care security solutions The safety of residents and staff is the most important thing. Our objective at Gallagher is to create innovative solutions
More informationDo Crime Risk Assessment Reports Really Assess Crime Risk?
Do Crime Risk Assessment Reports Really Assess Crime Risk? 21 June 2011 SYDNEY LAW SCHOOL Garner Clancey Adjunct Lecturer, Sydney Institute of Criminology NSW Planning Instruments - Hierarchy EPA Act Environmental
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationPhysical Security. Introduction. Brian LeBlanc
Physical Security Introduction 1 Physical Security Provides for the protection of property, personnel, facilities, and material against unauthorized entry, trespass, damage, sabotage, theft, or other criminal
More information2 ESF 2 Communications
2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2
More informationSelect Agents and Toxins Security Plan Template
Select Agents and Toxins Security Plan Template 7 CFR Part 331.11, 9 CFR Part 121.11, 42 CFR Part 73.11 Prepared by U.S. Department of Health and Human Services (HHS) Centers for Disease Control and Prevention
More informationEmergency Management & Disaster Planning
Emergency Management & Disaster Planning What we re going to talk about What is Emergency Management and Disaster Planning? What are the key elements of an EM Plan? Where does the University Architect
More informationACI-NA 2018 Risk Management Conference SAFETY Act. Washington, D.C
ACI-NA 2018 Risk Management Conference SAFETY Act Akmal Ali, J.D. akmal.ali@catalystdc.com Principal, Catalyst Partners 1250 Connecticut Ave. NW www.catalystdc.com Washington, D.C. 20036 Following the
More informationWalmart Resiliency NCEM ECU Hurricane Conference May 2016
NCEM ECU Hurricane Conference May 2016 Emergency Management Guiding Principles Taking Care of Our Associates Taking Care of Our Operations Taking Care of Our Communities 2 Why Preparedness Matters to Walmart
More informationMARYLAND S STRATEGIC GOALS AND OBJECTIVES FOR HOMELAND SECURITY
MARYLAND S STRATEGIC GOALS AND OBJECTIVES FOR HOMELAND SECURITY January 15, 2009 TABLE OF CONTENTS A Message from Governor Martin O Malley 3 Core Goals for a Prepared Maryland 4 Interoperable Communications
More informationSecurity Guideline for the Electricity Sub-sector: Physical Security Response
Security Guideline for the Electricity Sub-sector: Physical Security Response Preamble: This guideline addresses potential risks that can apply to some electricity sub-sector organizations and provides
More information