Active Shooter Module
|
|
- Virgil Rogers
- 5 years ago
- Views:
Transcription
1 Active Shooter Module
2 Active Shooter Module Scope The scope of this exercise is to prepare your organization and notification system to run an exercise around an active shooter on you site(s). This plan sets out the basic steps required to be successful in preparing for, responding too and reporting of such an event. This module should be used in conjunction with the Everbridge Crisis Management framework. 1. Employee advice and guidance. 2. Configure Incident templates to inform contacts of the following messages: a. Shelter in place message. b. All clear. c. Test shelter in place message. d. Test all clear. e. Incident templates for each site and if required multiple sites. 3. Reporting for: a. A real event including providing muster reports/feedback to emergency responders. b. Testing metrics and base lines to report to leadership and employees. 4. Exercise schedule. The frequency that the exercise will be run. This document directly addresses points two and three and will instruct you how to contact an exercise that will assist you in preparing. When running an active shooter exercise you MUST ensure that any messages sent are clearly labelled as exercises. Normally any communications around such a drill will include the word EXERCISE at the start and the end of any message. This rules out the situation that a contact, relative or press receive the message and think it s a live situation. This plan may be used in savagery with other plans for other types of situation.
3 1: Active Shooter Advice 1. RUN a. Have an escape route and plan in mind b. Leave your belongings behind c. Keep your hands visible 2. HIDE a. Hide in an area out of the shooter s view b. Block entry to your hiding place and lock the doors c. Silence your cell phone and/or pager 3. FIGHT a. As a last resort and only when your life is in imminent danger b. Attempt to incapacitate the shooter c. Act with physical aggression and throw items at the active shooter This is an example of a very high level set of guidance based on the Department of homeland security found here. An informational video based on this advice can be found here. Depending on your organization and location this may vary. The goal of this advice is to establish a level of education around what is expected of from employees in the event of an active shooter or possible active shooter. 2: Initial Incident Template Configuration Initial Message: Message Sender: (auto complete). Time: (auto complete). Location: (rules/group to target selected area/building). Message: Active Shooter in {Location} take all appropriate actions immediately. NOTE: The location field must reflect your office or facilities. If only one location is being managed this can be skipped to allow even faster launching.
4 It is also possible to attach the active shooter guidance as a document to and the member app. This is highly advised. Mode 1. Member app. 2. Corporate Corporate Mobile. 4. Corporate SMS. 5. Personal SMS. 6. Corporate Land Line. NOTE: All paths are sent at once this is because the nature of the threat. This may vary from location to location or depend on different cultural norms. However, given the nature of the issue the message must go to as many people, by as many paths as soon as possible. 2.1 Incident template messages: Below are the template messages that have been approved. 1. Shelter in place message. a. Title: Situation RED at LOCATION Shelter in place. b. Body: Immediately find shelter in a safe location. Reply 1: I am at risk. Reply 2: Understood. Reply 3: I have left the area and am safe. Reply 4: I am not in the office and am safe. 2. All clear. a. Title: Situation GREEN at LOCATION All clear. b. Body: The situation has been resolved. Reply 1: I am under threat. Reply 2: OK. Reply 3: I still have concerns. 3. Test shelter in place message. a. Title: Situation GREEN at LOCATION Shelter in place test. b. Body: Please carry on as normal, this is just a drill. Reply 1: OK. Reply 2: I have questions regarding the drill.
5 4. Test all clear. a. Title: Situation GREEN at LOCATION Shelter in place all clear test. b. Body: Please carry on as normal, this is just a drill. Reply 1: OK. Reply 2: I have questions regarding the drill. Message template should be setup ahead of time and must be communicated to employees so they understand them before a crisis event. The messages must be short and to the point given the nature of an active shooter situation. 2.2 Managing active shooter templates. Scope: Template management should be setup in the following way. Given the nature of an active shooter situation it is important to keep in mind a number of key objectives. Firstly, is to enable the site or location to quickly inform every one of the situation. Secondly, to inform remote office leadership of the situation. Thirdly, to ensure that you communicate with the all employees about the situation. Local template: The template used at the site for people in a building. Template title: Active Shooter. Variables: None. Two click launch. Escalation points: Launches notifications to all employees at site as well as the CMT. Active shooter templates should be very short and send a pre scripted message as detailed elsewhere in this document. It is essential to ensure that the message is also broadcast to additional contact points such as other locations leadership and sites.
6 2.3 Emergency test scenario Active Shooter Scope: As this is a test scenario all aspects of the plan are to be invoked as if they are occurring in real time. This should include escalated to all relevant parties. 1. Launch initial notification. Initiate the message from either the location or for the location. Sent to Who: Sent When: Instruction: (invacuation / shelter in place / other) Methods: (Business land line / business mobile / business sms / etc). 2. Launch secondary Nictation to CMT. Primary focus is to ensure that communication is manged across the company. a. Log initial message / Alarm raised at b. What, who, when, where how. c. Establish CMT team with roles identified. d. Establish communications with first responders. e. Prepare first press statement with in the hours (pity, praise, promise): Incident has occurred, we are concerned, the emergency services are managing the situation admirably, we promise to investigate this fully. f. Set media update schedule. g. Update employees with information on next steps, actions. 3. Send messages to non-affected sites as briefed in section 3. LOG: NO. ACTIVITY WHO WHAT WHEN OUTCOME
7 Active Shooter Module FAQ: In this section you will find some common questions that are asked around the active shooter threat. Q: Do you share the shooter s (or shooters ) last known location only, or also direction of travel? And do you share this information with all recipients, or only with tactical responders? A: In many cases it is advised to tell people to evacuate by the nearest safe route. A location of a known suspect can be helpful but should not add confusion. Q: For events occurring in a public venue, such as an airport, shopping center, sports complex, corporate campus: do you include actionable information to recipients, such as lock doors, barricade doors, exit building through emergency exits or any means possible? A: This information can be helpful if your origination has not educated employees ahead of an incident. In the event of a threat in a public area this information can be helpful. Q: In the notification content, do you instruct recipients to silence cell phones? A: Yes, if employees have not been pre educated. Q: How do you recommend conducting drills, and with what frequency? A: This will depend on the risk profile of your origination. It is advised that as well as running drills employees are educated with information of how to respond in an active shooter situation.
East Falls Campus. Active Shooter. Bob Stack Security Operations Manager
East Falls Campus Active Shooter Bob Stack Security Operations Manager Issues: Initial Notification of an Incident and continued Communication during the Incident 40+ Buildings spread of 100+ acres Public
More informationMHCC Emergency Notification System (ENS) Protocols
MHCC Emergency Notification System (ENS) Protocols Introduction MHCC has an Emergency Notification System (ENS) with multi communication capabilities. MHCC s ENS is intended to rapidly disseminate emergency
More informationSt. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN
St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN ERP Lockdown may be initiated in response to incidents originating within the facility, or incidents occuring in the community that have the
More informationRESILIENCY MESSAGE MAPS
Prepared by: RESILIENCY MESSAGE MAPS Prepared for: (Company XYZ) MESSAGE CONTENT SAMPLES: 1. CONTACT INFORMATION - UPDATE REQUEST 2. COMMUNICATIONS TEST 3. HURRICANE - COMMUNICATIONS TEST 4. CONFERENCE
More informationBroadcast Notification solutions
Broadcast Notification solutions Fast, accurate group communication to enhance your security response security.gallagher.com Broadcast Notification solutions Mobile Network Provider Staff in building 2
More informationACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response
ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT ACTIVE SHOOTER RESPONSE Responding to armed assault acts of terrorism and active shooter incidents Acts of terrorism and shootings in public places have become
More informationWHO IS ONSOLVE? MIR3 Send Word Now OnSolve, LLC. All rights reserved.
WHO IS ONSOLVE? OnSolve is the market leader of SaaS-based emergency notification tools capable of delivering millions of alerts in response to any type of critical or routine event anywhere in the world.
More informationMESSAGE MAPPING BEST PRACTICES
MESSAGE MAPPING BEST PRACTICES Introduction With rapidly advancing technology and the mass adoption of mobile devices, employees, citizens and key stakeholders now expect immediate notification of any
More informationThe Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Measures for Public Gatherings Western Region Healthcare Emergency Preparedness
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationJuly 31, University of Maryland Emergency Management Faculty Staff Essentials
July 31, 2015 University of Maryland Emergency Management Faculty Staff Essentials What is Emergency Management? 2 What is Emergency Management? The process of preparing for, mitigating, responding to
More informationBelow are a few questions you should be asking when planning your communication strategy for potential employee threats:
Introduction As an organization, one of your major priorities is keeping the people you employ safe. This can be a difficult task, especially if you aren t prepared. In order to best protect your employees
More informationFor more information: FONETRAC - FULL INTEGRATION WITH GLOBAL MONITORING
FONETRAC - FULL INTEGRATION WITH GLOBAL MONITORING For more information: http://fonetrac-go.com 1995-2018 IMG GlobalSecur, Inc. All Rights Reserved. GlobalSecur & FoneTrac are registered trademarks of
More informationImplementing NFPA 3000 (PS)
Implementing NFPA 3000 (PS) Standard for an Active Shooter / Hostile Event Response (ASHER) Program IT S A BIG WORLD. LET S PROTECT IT TOGETHER. Need for Guidance Leads to New Standard 2 Active Shooter
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Hometown Security Overview Minnesota Festivals and Events Association 5 November, 018
More informationBest Practices for Incident Communications: Simplifying the Mass Notification Process for Government
Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government Introduction State and local governments and their supporting agencies encounter emergency situations
More informationBest Practices for Campus Security. January 26, 2017
Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner
More informationOperators Guide Version 6.8
Operators Guide Version 6.8 Last updated 6 th February 2006 for 6.8 Patch 10 Refer to the separate Administration Guide for Configuration of your helpdesk 2006 sitehelpdesk.com Ltd Table of Contents Section
More informationTip Sheet: Safety Communications During Severe Weather
Tip Sheet: Safety Communications During Severe Weather The 2017 Hurricane season is one for the record books. Hurricane Harvey dropped a record 51.88 inches of rainfall near Highland, Texas. Hurricane
More informationLockdown policy (exams) 2017/18
Lockdown policy (exams) 2017/18 This policy is reviewed annually to ensure compliance with current regulations Approved/reviewed by Carl Smith (Principal) Date of next review March 2019 Key staff involved
More informationEmergency Support Function (ESF) #17a: COMMUNICATIONS: PUBLIC. ESF Activation Contact: Cornell University Police (607)
Emergency Support Function (ESF) #17a: COMMUNICATIONS: PUBLIC ESF Activation Contact: Cornell University Police (607)255-1111 Primary Department Support Departments External Agencies I. Purpose University
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationTravelling Intelligently. International SOS Supports NTU Staff & Students In Mitigating Travel-Related Risks
Travelling Intelligently International SOS Supports NTU Staff & Students In Mitigating Travel-Related Risks Travelling Aboard What You May Face Road Accident Medical Emergency Security Emergency Clinic
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationSM04: Transforming Your Security Command Post into a Strategic Information Nerve Center
SM04: Transforming Your Security Command Post into a Strategic Information Nerve Center Bob Banerjee, Sr. Director of Training and Development, NICE Systems (Moderator) Brad Brekke, Vice President of Corporate
More informationCisco IPICS Case Study: Cisco Safety and Security
Cisco IPICS Case Study: Cisco Safety and Security Cisco manages day-to-day safety and security incidents using IPICS. EXECUTIVE SUMMARY SAFETY AND SECURITY, CISCO SYSTEMS Corporate safety, security and
More informationPARTNER Messaging System User s Guide
PARTNER Messaging System User s Guide 518-100-701 Issue 3 May 2004 Copyright 2004, Avaya Inc. All Rights Reserved Notice Every effort was made to ensure that the information in this document was complete
More informationElectronic Communications with Citizens Guidance (Updated 5 January 2015)
Electronic Communications with Citizens Guidance (Updated 5 January 2015) Overview - Email Activities Outside Of The Scope Of The Policy And This Guidance Requests To Use Email/SMS Outside The Scope Of
More informationWHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA
WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY Integrating Resiliency into Our Culture and DNA Table of Contents Executive Summary.... 3 Background.... 4 Charter.................................................................4
More informationTen Top Questions About Emergency Notification & Some Surprising Answers
Ten Top Questions About Emergency Notification & Some Surprising Answers An Airbus DS Communications White Paper January 2017 2017 Airbus DS Communications, Inc. All rights reserved. Page 1 of 10 Emergency
More informationIntroduction. Overview. Every Crisis Management Team Needs a Critical Decision Checklist. Presented by Roseanne Rostron, CBCP President Raido Response
Every Crisis Management Team Needs a Critical Decision Checklist Presented by Roseanne Rostron, CBCP President Raido Response Tuesday, May 9, 2006 Introduction Roseanne Rostron, CBCP - President Raido
More informationPrepare your Emergency respons, continuity plan, recovery plan
Prepare your Emergency respons, continuity plan, recovery plan Panel Discussion with PortAventura,Europa Park, Disneyland Paris,Liseberg,the Safety Committee members with Q & A from attendees Septembre
More informationCyber Security Congress 2017
Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee
More informationLMIS on cloud V2.3.1
UNIRITA INC. LMIS on cloud V2.3.1 Operations Guide Duplication of this document or reprinting of the included images and text is not permitted. LMIS on cloud is a trademark of UNIRITA Inc. Force.com and
More informationSchool Safety & Security: Priorities for Facilities
School Safety & Security: Priorities for Facilities Speakers Brett Hobza, AIA DLR Group Principal/K-12 Sector Leader Phil Wentz Tigard-Tualatin SD Facilities Manager Clem Spenner Willamette ESD Threat
More information12/05/2017. Geneva ServiceNow Security Management
12/05/2017 Security Management Contents... 3 Security Incident Response...3 Security Incident Response overview... 3 Get started with Security Incident Response... 6 Security incident creation... 40 Security
More informationWorkflow Engine and Escalation Guide
1 Introduction Workflow Engine and Escalation Guide The SupportDesk Work Flow Engine (Escalator) automatically escalates Calls and notifies parties. This guide provides help in using this module in conjunction
More informationInstructions for Installing The BC Alert Emergency Notification System Mobile App thru Everbridge, Inc.
Instructions for Installing The BC Alert Emergency Notification System Mobile App thru Everbridge, Inc. Brazosport College has an Emergency Alert Notification system that is used to notify Students, Faculty,
More informationExams policy 2017/18. This policy is reviewed annually to ensure compliance with current regulations. Approved/reviewed by
Exams policy 2017/18 This policy is reviewed annually to ensure compliance with current regulations Approved/reviewed by Rachel Fawcett (Exams Officer) and Wendy Randall (School Business Manager) Approved
More informationLockdown policy (exams) 2017/18
Lockdown policy (exams) 2017/18 This policy is reviewed annually to ensure compliance with current regulations This policy can be viewed on the school website. Approved/reviewed by Gail Elms Chair of Governors
More informationPowerLogic Active Pager Module Version 6.1
Version 6.1 Instruction Bulletin 3080IB0801 February 2009 Table of Contents 02/2009 Table of Contents Table of Contents... ii CHAPTER 1 INTRODUCTION... 1 PowerLogic Active Pager Module... 1 About this
More informationDeveloping Crisis Communication Frameworks for Strategic Response
Developing Crisis Communication Frameworks for Strategic Response Marjorie Smallwood, MPH Workplace Violence Prevention Program Manager UCSF Health Francine Sneddon IT Service Continuity Process Manager
More informationProcess Definition: Security Services
Process Definition: Services 1. SUMMARY Process Definition: Services 1.1. This document defines the processes provided by the Services team in detail. 1.2. The relationship between this Business Unit process
More informationFrontiers of Risk. Don t Be Afraid: Business Continuity Plan Development Only Hurts A Little!
Don t Be Afraid: Business Only Hurts A Little! Frontiers of Risk Community College Risk Management Consortium July 20-21, 2017 JILL MCEWEN - FOX VALLEY TECHNICAL COLLEGE JOE DESPLAINES DISTRICTS MUTUAL
More informationWalmart Resiliency NCEM ECU Hurricane Conference May 2016
NCEM ECU Hurricane Conference May 2016 Emergency Management Guiding Principles Taking Care of Our Associates Taking Care of Our Operations Taking Care of Our Communities 2 Why Preparedness Matters to Walmart
More informationWhip Your Incident Response Program into Shape
Whip Your Incident Response Program into Shape 1 Agenda Introductions Understand requirements behind an incident response program (IRP). Identify the different components of an effective IRP. Learn how
More informationPractical Guide to Cloud Computing Version 2. Read whitepaper at
Practical Guide to Cloud Computing Version 2 Read whitepaper at www.cloud-council.org/resource-hub Sept, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards! 2011/2012 Deliverables
More informationGETTING STARTED WITH LONER BRIDGE & LONER 900
ARTICLE The Loner Bridge system consists of Loner 900(s) that connect to the Loner Bridge. This guide will help you get started with your Loner Bridge system. This guide will walk you through: 1. Using
More information37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS
37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS TABLE OF CONTENTS INTRODUCTION 3 QUESTIONS BEFORE YOU BUY 4 USING CELLCONTROL 9 iphone-specific QUESTIONS 14 ANDROID AND WINDOWS PHONE-SPECIFIC
More informationTHE CALL TRACKER Synthesys Workflow
THE CALL TRACKER Synthesys Workflow Synthesys Call Tracker/ Work Flow 1 THE CALL TRACKER (Synthesys Workflow) Introduction... 3 Call Tracker and On-site Service Calls... 3 Call Tracker and Outstanding
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationOklahoma State University IT Telecommunications Voice Mail User Guide
Oklahoma State University IT Telecommunications Voice Mail User Guide What s Inside Welcome.3 Getting Started....4 Listening to Messages.6 Recording and Sending Messages...8 Customizing Your Mailbox. 9
More informationInspections and Audit Trends
p. 01 Inspections and Audit Trends Rumors p. 02 IT Inspection, preparations Arranged meetings p. 03 Understood that IT would be an important element Established an PV/IT Inspection Preparation Team Developed
More informationGetting Started with the Severe Weather Shelter Scheduling Software
Volume 3 HOMEBASE USER MANUAL Kitsap County Severe Weather Shelters Updated November 29, 2018 Getting Started with the Severe Weather Shelter Scheduling Software Table of Contents About Homebase Scheduling
More informationAuckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL
Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual Overview Purpose Electronic mail (email) is a business communication tool within ADHB and this policy outlines use of email
More information(800) Ó AlertMedia
Ó AlertMedia 2019 Winter Weather Communication Templates When preparing to communicate during winter weather, you should consider the different situations that may occur throughout the duration of a storm
More informationGRAMPIAN SCG PUBLIC COMMUNICATIONS PLAN
Page 1 of 11 Page 1 of 11 Communications Plan GRAMPIAN SCG PUBLIC COMMUNICATIONS PLAN Version: Communications Liaison Group Approval Planned Review Chair SCG Plans Workstream Protective Marking: Planned
More informationInformation Security Guideline CONFIGURING MACRO SETTINGS
Information Security Guideline CONFIGURING MACRO SETTINGS Updated - August 2017 THIS PAGE INTENTIONALLY LEFT BLANK Disabling or limiting Microsoft Office macros can aid in preventing malicious code from
More informationBundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.
Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business
More informationUTAH VALLEY UNIVERSITY Policies and Procedures
Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information
More informationExam Contingency Plan
Document Control - Document Details Document Name Exam Contingency Plan Purpose of Document The purpose of this plan is to examine potential risks and issues that could cause disruption to the management
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationHow Can Your Church Make an Impact with a Crisis Communication Strategy?
How Can Your Church Make an Impact with a Crisis Communication Strategy? How your church maneuvers through moments of crisis either illuminates the hope you profess or causes stumbling blocks to an already
More informationGlobal Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.
Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,
More informationIntroduction...4. Purpose...4 Scope...4 Manitoba ehealth Incident Management...4 Icons...4
Remedy Incident Management Version 3.2 Modified: 08/24/2017 TABLE OF CONTENTS Introduction...4 Purpose...4 Scope...4 Manitoba ehealth Incident Management...4 Icons...4 Incident Stages Overview...5 Identification
More informationExam contingency plan 2017/18
Exam contingency plan 2017/18 This plan is reviewed annually to ensure compliance with current regulations Approved/reviewed by Date of next review Key staff involved in contingency planning Role Head
More informationJanuary 2010 Version 9.0
Level 1 Sending and receiving e-mails (7266/7267-007) e-quals Assignment guide for Candidates Assignment A (This assignment can be used as evidence of achievement of 7574-108 Using e-mail) www.cityandguilds.com/e-quals07
More information2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,
2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered
More information(Office 365) Service Level Expectation
Email SLE Service Overview... 2 Service Features... 2 Service Warranty... 3 Support Model... 3 Support Hours and Initial Response Times... 4 Support Request Resolution Targets... 5 Service Request Fulfillment
More informationRightNow eservice Center 5.5 New Administrator s Survival Guide
RightNow eservice Center 5.5 New Administrator s Survival Guide Table of Contents You may click on each line below to go to that section of this document. OVERVIEW...3 HELPFUL RESOURCES...4 GAINING FAMILIARITY
More informationUlster University Policy Cover Sheet
Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective
More informationProviding safety & reassurance. to football fans travelling within Russia during the 2018 World Cup
Providing safety & reassurance to football fans travelling within Russia during the 2018 World Cup Al Thuraya Consultancy in conjunction with ICESERVE24 is supporting the safety and security of world cup
More informationBusiness Continuity Management Program Overview
Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this
More informationManage your response. Inform your people. Make it happen. IBM Crisis Management Services Incident Communication Services
Manage your response. Inform your people. Make it happen. IBM Crisis Management Services Incident Communication Services During a critical situation, normal lines of communication may fail when you need
More informationBusiness Continuity and Disaster Recovery
Business Continuity and Disaster Recovery Index Section Title 1. Executive Summary 2. Policy Statement 3. Strategy 4. Governance 5. Key Documentation 6. Testing 1 Executive Summary Business Continuity
More informationMaster Information Security Policy & Procedures [Organization / Project Name]
Master Information Security Policy & Procedures [Organization / Project Name] [Version Number / Date of [Insert description of intended audience or scope of authorized distribution.] Authors: [Names] Information
More informationRave Alert Instructions
Rave Alert Instructions Log In to Rave To log in, browse to https://www.getrave.com/login/swmich Enter your SMC e- mail address and Rave System password then click Log In. Note: Access to the Rave System
More informationLift Internal Revitalizing B2E Communication. LiftInternal.com
Lift Internal Revitalizing B2E Communication LiftInternal.com Use this document to help you plan and execute B2E communication. Even if the topic seems simple, taking the time to think through the fundamentals
More informationPeople Assets Reputation
Welcome to Spearpoint International LLC The risks faced by global business are greater now than ever, the increasing danger from terrorism and the ever present threat from organized and opportunistic crime
More informationAmerican Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment
American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment July 20, 2017 DECIDEPLATFORM.COM The new Reality of Cyber Security
More informationGlobal Crisis Management at Target
Global Crisis Management at Target Bryan Strawser Group Manager, Global Crisis Management Target & Chairman, Private Sector Committee, National Emergency Management Association (US) Global Crisis Management
More informationStaff AUP (Acceptable Use Policy)
Guidance review Date April 2014 Date of next Review April 2016 Who reviewed this Guidance? Deputy Headteacher Guidance: Staff AUP (Acceptable Use Policy) Rights Responsibilities How does the school protect
More informationConnected Driver 2.0 App Changes
Connected Driver 2.0 App Changes On 9/26/16 an update will be released to the connected driver app. This update will require drivers to log in to the app again and may cause some confusion. If the driver
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationFlorida State University
Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that
More informationWhite Paper. 7 Best Practices in Emergency Notifications
White Paper 7 Best Practices in Emergency Notifications 7 Best practices in emergency notifications Table of Contents Introduction 3 1. Make Every Message Count 4 2. Create Emergency Notification Templates
More informationTop 10 Actions A CIO Can Take To Prepare For A Hurricane. Practical advice from well prepared CIOs of Gulf Coast companies
Top 10 Actions A CIO Can Take To Prepare For A Hurricane Practical advice from well prepared CIOs of Gulf Coast companies 1 Overview While the 2007 hurricane season was very active with 15 named storms
More informationHighway & Motor Carrier Orientation & Modal Overview. June 2018
Highway & Motor Carrier Orientation & Modal Overview June 2018 Highway & Motorcarrier Overview The highway and motor carrier (HMC) industries and its supporting infrastructure are by its very nature open
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Native American Risk Management Conference 20 July, 2018 Bridging the Gap: Delivering
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationsecurivy INFORMATION SYSTEMS MANAGEMENT ILLINOIS INSTITUTE OF TECHNOLOGY A New Model for Business Contingency Operations Ray Trygstad
information technology & management INFORMATION SYSTEMS securivy t MANAGEMENT ILLINOIS INSTITUTE OF TECHNOLOGY A New Model for Business Contingency Operations Ray Trygstad 2008 Ray Trygstad Director of
More informationLaguna Honda Hospital and Rehabilitation Center. Security Management Plan
Laguna Honda Hospital and Rehabilitation Center Security Management Plan 2018-2019 REFERENCES California Code of Regulations, Title 8, Sections 8 CCR 3203 et seq. California Code of Regulations, Title
More informationGuidance for Accident Reporting
Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need
More informationCOURSE SYLLABUS Introduction to Automotive Technology.
COURSE SYLLABUS. Course Number AUMT 1305 2-6 - 3 Lecture - Lab - Credit NONE This syllabus has been reviewed and is current on the date indicated. Prepared By Henry Ortega 08/13/15 Reviewed By Si Acuna
More informationILM Whistle-blowing Policy for Centres, Providers and Candidates
ILM Whistle-blowing Policy for Centres, Providers and Candidates V1 November 2017 Contents Document Change History 2 Scope 3 Definition 3 How to report a concern 4 What happens next? 4 Confidentiality
More informationPublishers Software Publications Pty Ltd (ABN )
Organise Schedules This book supports BSBADM307B Organise Schedules, in the Business Services Training Package BSB07. Copyright Beverley Weynton, November 2002, October 2007, 2008, 2011 This revised edition
More informationPOSITION DESCRIPTION
UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:
More informationGlobal Crisis Management at Target
2011/EPWG/WKSP/008 Session 1 Global Crisis Management at Target Submitted by: Target Workshop on Private Sector Emergency Preparedness Sendai, Japan 1-3 August 2011 Global Crisis Management at Target Bryan
More informationwww.hollieguard.com @hollie_guard Welcome to your User Guide Launched in October 2015, Hollie Guard is taking the mobile world by storm. With more than 20,000 downloads and users since its release. It
More information