College Safety and Security
|
|
- Cody Marshall
- 5 years ago
- Views:
Transcription
1 College Safety and Security Audit
2 Steve M. Ramirez, Law Enforcement Specialist, Higher Education Services 30 years experience in law enforcement 5 years United States Marine Corps 10 years as Chief of Police 5 years Director, Regional Police Academy M.S. Human Resource Development/Training Post Graduate Studies: Criminal Justice/HLS Master Peace Officer/Trainer
3 Presentation Goals Introduction Who we are What we do Audit Guide Overview Philosophy and Methodology Review of the Safety and Security Audit Guide Give and Take
4 Audit Guide Presentation Objectives Be able to demonstrate understanding of: The TxSSC Higher Education Mission and Services The Chapter 37- Texas Education Code Requirements for Public Junior Colleges The Philosophy, methodology, and application of the TxSSC Safety and Security Audit Guide The Actions that are mandated by law and that are mandated by prudence
5 Texas School Safety Center The Texas School Safety Center has two full time staff dedicated to supporting the public community/junior colleges. The staff has an extensive background in emergency management and campus law enforcement.
6 Support for Your Emergency Management Program Training in Incident Command System (ICS) Classes in emergency planning for community colleges Support in developing and conducting your exercises Technical assistance for your emergency management and public safety programs.
7 Support for Your Safety and Security Program Specialized training i designed d for campus Police/Security Advice and support for your Campus Police/Security it operation Support in developing and conducting your exercises Support in developing and conducting Reality Based Training (RBT) Information and technical assistance
8 Chapter 37- Texas Education Code Requirements for Public Junior Colleges Shall adopt and implement a multi-hazard emergency operations plan At least once every three years conduct a safety and security audit Shall report the results of the safety and security audit to the trustees and to the Texas School Safety Center
9 No Worries The Texas School Safety Center (TXSSC) is here to help YOU! You have time The School Safety and Security Report is not due till September 31, 2012
10 Our Support for Your School and Safety Audit A safety and security audit template crafted for use by the public junior colleges Training in how to use our safety and security audit template Advice while you conduct your audit
11 Timeline for the School Safety and dsecurity Audit January-April 2010 Audit Guide Development Summer 2010 Regional seminars on the audit template t Fall 2010 to Spring 2012 Junior College Audit Report (JCAR) questions developed Summer 2012 JCAR questionnaire online Fall/September 31, 2012 JCAR reporting deadline
12 Audit Guide vs. JCAR Audit Guide Is completed every three years The Institution can use the Texas School Safety Centers Audit Guide or other available product The results are for internal use only JCAR Is to be submitted for each legislative session Must complete and submit the results of the JCAR to the Texas School Safety Center
13 Junior College Audit Report (JCAR) Will be available online the summer of The public junior college must use the JCAR provided d by the Texas School Safety Center. It is mandatory that each public junior college complete this report not later than September 31, 2012.
14 JCAR The results of this report is not subject to disclosure under Chapter 552, Government Code A summary of the reports will be submitted to the: Governor, Texas State Legislature, The Texas Board of Education, and Other agencies that contain current information on safety and security in the Public Junior Colleges of this state
15 What Can We Do?
16 Why Must We Do It?
17 What Can We Do? Deter Detect Delay Disengage* Defeat
18 Objectives of the Audit Process Compliance with Chapter 37 Texas Education Code Reflective self-assessment of your institutions level of safety, security, and emergency preparedness Striving to create a feeling and reality of safety, security, and preparedness on our campuses Creating a culture that enhances situational Creating a culture that enhances situational awareness and active participation in public safety
19 Philosophy and Methodology A holistic approach A macro view Creating opportunity for learning, cooperation, and integration Addressing what is mandated by law/regulation and by prudence Addressing what should be and what could be Allow for institutional customization
20 Institutional Responses Yes/True No/False N/A Comments
21 Sectional Introduction Environmental Design Police Security Emergency Management Information Technology Environmental Health and Safety Facilities Business Continuity Policy Communications Residential Resources
22 Environmental Design
23 Philosophy and Methodology Environment and human behavior Place and target vulnerability and victimization Crimes against people/property Use of environmental countermeasures
24 Threat Assessment Contiguous environment/off campus Survey (feeling) Crime Statistics (reality) Campus environment/on campus Survey (feeling) Crime Statistics (reality)
25 Behavioral Assessment Behavioral Assessment Plan Threat Assessment Group Counseling/Health Services Employee Assistance Program Code of Conduct/Disciplinary Referral Community Awareness/Reporting Emergency Notification Joint Information Center Victim/Family Assistance
26 Physical Safety/Security General Safety/Security y Environment Fire/Emergency Medical CCTV Surveillance/Alarms/Monitoring Architecture/Landscaping Access Control
27 Police -Security
28 Philosophy Crime Cycle Dimensions: Law Target Place Capable Guardians
29 Methodology Authority Organization Administration Training Capabilities Communication Compliance
30 Authority and Administration Certification Organization Records Management Human Resources Recruitment Selection Performance Evaluation Promotion Discipline
31 Police Training Position Specific Chief of Police Line Supervisors Field Training Officers TCLEOSE Instructors Firearms Instructors
32 Police Training Firearms Training /Qualification Response to Active Shooter Reality Based Training Less Lethal Weapons Legal updates Department Policy Use of Force Arrest, Search and Seizure Family violence MHMR Emergency Telecommunications
33 Police/Security Training Emergency Management Leadership Role Critical Role General Role
34 Capabilities General Patrol Criminal Investigations Evidence Collection, Preservation, and Control Temporary Detention/Detainee Transport Traffic Control and Enforcement Crime Prevention Operations Internal Affairs Victim Services/Crime Impact Mitigation
35 Capabilities Specialized Special Event Operations Special Operations Homeland Security/Criminal Intelligence Operations
36 Communication Emergency Telecommunications Public Information Web-Site Development and Application
37 Compliance Chapter 37 Texas Education Code Safety and Security Audit/Report Clery Act Annual Crime Report Higher Education Opportunities Act Annual Fire Safety Report
38 Clery Act Compliance Policy Disclosure Records Collection and Retention Information Dissemination
39 Emergency Management
40 Philosophy Based upon the All Hazards or Multi- Hazard approach to emergency management planning Based upon the National Incident Management System (NIMS) Based upon the guidance from the Texas Based upon the guidance from the Texas Division of Emergency Management (TDEM) for political subdivisions
41 Methodology Developed levels of preparedness based upon TDEM guidance/ NIMS compliant for the following areas: Planning Training Drilling/Exercising
42 Information Technology/Security
43 Philosophy and Methodology Reflective of Texas Administrative Code, Title 1, Part 10, Chapter 202, Subchapter C, Security Standards for Institutions of Higher Education Based of currently identified preferred practices Provides a quick snapshot of the institutions Information and Technology Security
44 Environmental Health and Safety
45 Philosophy and Methodology Based upon OSHA and NFPA guidance Based of currently identified preferred practices Intended to provide a general indication of Intended to provide a general indication of the institution s health and safety environment.
46 Facilities
47 Philosophy and Methodology It is important that the institution identifies hazards before an incident/accident id id occurs It is important that the institution mitigates the known hazards within the capabilities of the institution It is important that the institution has a process in place to promote community involvement in facilities safety Construction must comply with the latest codes adopted
48 Business Continuity
49 Philosophy Safety and security are enhanced by an orderly and effective resumption of basic services. An effective and current BCP/COOP is vital to: Safety, security, and preparedness Liability limitation /reduction Financial loss limitation/reduction Compliance with regulations
50 Methodology Identifying Threats/Risk Identifying Impacts Identifying Critical Elements Emergency Operations Center Plan Approval Process Plan Management
51 BCP Elements Threat/Risk Identification and Classification Response Restoration Exercises Plan Maintenance Business Recovery Team Contact information
52 Monetary/Non Monetary Impact Students, Faculty, and Staff Safety Institutional Reputation Regulatory Compliance Loss of Critical Services Property Loss Fines Cash Flow Legal Costs
53 Identifying Critical Elements Critical Hardware/Software Critical Support Equipment Critical Personnel Academic Continuity- Functions/Processes Internal/External Dependencies All Hazards Approach
54 Who Approves the Plan? College President Administration and Finance Student Development/Residence Life Information Technology Campus Police/Security Emergency Management Environmental Health and Safety Facilities Management
55 Emergency Operations Center Location Identified Power and Utilities Communication Security
56 Policy
57 Philosophy and Methodology Intended to cover institution policies of the various sections of this audit Intended to promote awareness among members of the college administration in regard to their key role in safety, security, and emergency management programs
58 Communications
59 Philosophy Ensure Effectiveness of: Internal Communications External Communications
60 Emergency Communications Redundancy Regular Testing Automatic Enrollment Staff Training Timely Target Specific Secure
61 Residential
62 Philosophy and Methodology Takes an environmental and systems design approach Is purposefully redundant with the environmental design section Is designed ed to promote ote student t life/development involvement in the process
63 Denial has no survival value; it kills twice: physically and psychologically. Lt. L Col Dave Grossman
64 Cost vs. Benefits What if to save money the Governor ordered all public high school and college football programs to be suspended? What do you think would happen? Do you think we put our money into what o you t e put ou o ey to at we really value most?
65 Points of Contact Steve Ramirez, MS Law Enforcement Specialist Local Phone: Toll free: Brad Ellis, MCRP Emergency Management Specialist Local Phone: Toll free:
Number: USF System Emergency Management Responsible Office: Administrative Services
POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last
More informationBest Practices for Campus Security. January 26, 2017
Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner
More informationUNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017
UNC Campus Security Initiatives Update Business Affairs Committee May 9, 2017 UNC Campus Security Initiative In August 2013, President Ross asked for a review of current security practices, an assessment
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationPOSITION DESCRIPTION
UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationEMERGENCY MANAGEMENT
CSU The California State University Office of Audit and Advisory Services EMERGENCY MANAGEMENT California State University, Dominguez Hills Audit Report 16-43 August 30, 2016 EXECUTIVE SUMMARY OBJECTIVE
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationLifeguard Station. Emergency Management
Lifeguard Station Emergency Management Developing Campus Emergency Response Plans and Business Continuity Plans Lennette Dease and Barbara Andersen James Lee Witt Associates Part of Global Options Group,
More informationJoining Forces: Collaborating with Law Enforcement to Boost Resilience
Joining Forces: Collaborating with Law Enforcement to Boost Resilience Jan Merrick Director, Environmental Safety/Security/Emergency Preparedness, San Gorgonio Memorial Hospital Pat Brown Chief Nursing
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationPolicies and Procedures Date: February 28, 2012
No. 5200 Rev.: 1 Policies and Procedures Date: February 28, 2012 Subject: Information Technology Security Program 1. Purpose... 1 2. Policy... 1 2.1. Program Elements... 1 2.2. Applicability and Scope...
More informationINFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES
INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationGeneral Information Technology Controls Follow-up Review
Office of Internal Audit General Information Technology Controls Follow-up Review May 19, 2015 Internal Audit Team Shannon B. Henry Chief Audit Executive Stacy Sneed Audit Manager Rod Isom Auditor Winston-Salem
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationMaking YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning
2017 California Higher Education Collaborative Conference Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning Introductions Rick Blackburn,
More informationBusiness Continuity: How to Keep City Departments in Business after a Disaster
Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationStandard for Security of Information Technology Resources
MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information
More informationCorporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates
Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase
More informationPutting It All Together:
Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,
More informationAudit and Compliance Committee - Agenda
Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationNUIT Tech Talk. Emergency Preparedness. March 1, Sharlene Mielke. Jay Bagley. Disaster Recovery / Business Continuity Coordinator
NUIT Tech Talk Emergency Preparedness March 1, 2011 Sharlene Mielke Disaster Recovery / Business Continuity Coordinator Jay Bagley Distributed Support Specialist Information and Systems Security/Compliance
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationInformation Security Incident Response and Reporting
Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationBundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.
Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business
More informationOverview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET
Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationLocal Government Disaster Planning and what can be learned from it.
Local Government Disaster Planning and what can be learned from it. Emergency Operations Plans Emergency Support Functi0ns: ESF-1 ESF-2 ESF-3 ESF-4 ESF-5 ESF-6 ESF-7 Transportation Communications Public
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationRECERTIFICATION HANDBOOK
ARTBA Transportation Development Foundation SCTPP Recertification Handbook 1 RECERTIFICATION HANDBOOK www.puttingsafetyfirst.org ARTBA Transportation Development Foundation SCTPP Certification Commission
More informationManagement. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,
Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface
More informationAccess to University Data Policy
UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationFEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017
FEMA Update Tim Greten Technological Hazards Division Deputy Director NREP April 2017 FEMA Strategic Priorities Priority 1: Be survivor-centric in mission and program delivery. Priority 2: Become an expeditionary
More informationNERC Staff Organization Chart
NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability
More informationNIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA
NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY
More informationIntroduction to the National Response Plan and National Incident Management System
Introduction to the National Response Plan and National Incident Management System This presentation will cover: Homeland Security Presidential Directive (HSPD)-5 National Incident Management System (NIMS)
More informationPark Ranger Training and Standards
Park Ranger Training and Standards Purpose: To provide guidelines for the standards and training of the professional park ranger established by the Park Rangers Association of California. The standards
More informationOpportunity Lives Here
Opportunity Lives Here Southern Virginia Higher Education Center Policy Policy # 4107 Policy Title: INFORMATION TECHNOLOGY (IT) PHYSICAL ACCESS CONTROL POLICY Responsible Oversight Director: Chief Finance
More informationEMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY
EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale
More informationChapter 1. Chapter 2. Chapter 3
Contents Preface ix Chapter 1 Terrorism 1 Terrorism in General 2 Definition of Terrorism 3 Why Choose Terrorism 4 Goals of Terrorists 5 Selection of Targets and Timing of Attacks 6 Perpetrators 7 Weapons
More informationPUBLIC SAFETY FY BID PROCESS
PUBLIC SAFETY FY 11-12 BID PROCESS Presented to the Dallas City Council January 19, 2011 Public Safety Team Members Andy Acord, Dallas Police Department Cassandra Wallace, Office of Emergency Management
More informationThe City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.
Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV
More informationIAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities
59 th General Conference Senior Regulators Meeting Security Session 16 September 2015 IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities Khammar Mrabit Director,
More informationIntegration of Business Continuity, Emergency Preparedness, and Emergency Response
Integration of Business Continuity, Emergency Preparedness, and Emergency Response Continuity Insights Conference 2014 Julia Halsne Manager of Business Continuity East Bay Municipal Utility District Contents
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationDepartment of Justice Policing and Victim Services BUSINESS PLAN
Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.
More informationRisk Mitigation Strategies 2017 Tier 1 Risk Profile Interim Report UNCW Institutional Risk Management
Risk Mitigation Strategies 2017 Tier 1 Risk Profile Interim Report UNCW Institutional Risk Management Presented to the Audit, Risk and Compliance Committee of the UNCW Board of Trustees January 18, 2018
More informationNERC Staff Organization Chart Budget
NERC Staff Organization Chart 2013 2014 President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Senior Vice President and Chief Operating Officer (Dept. 2100) Senior Vice President General Counsel
More informationEmergency Support Function (ESF) #17a: COMMUNICATIONS: PUBLIC. ESF Activation Contact: Cornell University Police (607)
Emergency Support Function (ESF) #17a: COMMUNICATIONS: PUBLIC ESF Activation Contact: Cornell University Police (607)255-1111 Primary Department Support Departments External Agencies I. Purpose University
More informationIDENTITY THEFT PREVENTION Policy Statement
Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy
More informationALABAMA FIRE COLLEGE AND PERSONNEL STANDARDS COMMISSION ADMINISTRATIVE CODE CHAPTER 360-X-2 REQUIREMENTS FOR CERTIFIED FIRE FIGHTER TABLE OF CONTENTS
Fire College Chapter 360-X-2 ALABAMA FIRE COLLEGE AND PERSONNEL STANDARDS COMMISSION ADMINISTRATIVE CODE CHAPTER 360-X-2 REQUIREMENTS FOR CERTIFIED FIRE FIGHTER TABLE OF CONTENTS 360-X-2-.01 360-X-2-.02
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016
ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationFOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013
Deanna Williams FOUNDED 1980 In 1980, a group of professional and occupational regulators and private sector representatives met in New Orleans to discuss their need to share information. GOAL of New ORGANIZATION
More informationFIRE CODE ADMINISTRATOR PROGRAM
DEPARTMENT OF FINANCIAL SERVICES Division of State Fire Marshal Bureau of Fire Standards & Training Release Date: December 2012 Revised Date: May 2017 FIRE CODE ADMINISTROR PROGRAM I. Program Overview
More informationBusiness Continuity Planning
Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and
More informationCorporate Governance and Internal Control
01 20 Lawson 93 Lawson strives to enhance Corporate Governance by improving the soundness and transparency of management, through ensuring compliance and affirmative disclosure. Overall view of Lawson
More informationCybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City
1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the
More informationBusiness Continuity An Integral Part of Risk Management At Constellation Energy
Business Continuity An Integral Part of Risk Management At Constellation Energy World Disaster Management Conference Toronto, Canada June 19, 2006 Robert W. Cornelius Director Business Continuity Operating
More informationWhen Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.
When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of
More informationRailroad Infrastructure Security
TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John
More informationThe Texas A&M University System. Internal Audit Department. Fiscal Year 2014 Audit Plan
Introduction The purpose of the Audit Plan is to outline audits and other activities the System Internal Audit Department will conduct during fiscal year 2014. The plan is developed to satisfy responsibilities
More informationBusiness Continuity Management Standards A Side-by-Side Comparison
Business Continuity Standards A Side-by-Side Comparison By Brian Zawada (CBCP) & Jared Schwartz (CBCP) Whether your organization has begun a grassroots initiative to develop a business continuity plan
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationHazard Management Cayman Islands
Hazard Management Cayman Islands Strategic Plan 2012 2016 Executive Summary HMCI strategic plan outlines the agency s outlook in the next five years and illustrates the main strategies as goals that will
More informationSection 1 Metrics: Community Adoption
FY07 NIMS Compliance Metrics: Local/Tribal Section 1 Metrics: Community Adoption Compliance Requirement: Adopt NIMS at the community level for all government departments and agencies; as well as promote
More informationHealth Education Community Health Education
+ Master of Science Program Health Education Community Health Education CECH 2014 Primary Faculty: Keith King, PhD, MCHES 513-556-3859 keith.king@uc.edu I. Program Overview The Master of Science (MS) in
More informationPROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO
Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act (RSA 2000 ca-18); Copyright Act, R.S.C., 1985, c.c-42; Electronic Transactions
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationA Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic
More informationJoint ICTP-IAEA School of Nuclear Energy Management November 2012
2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationAuditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC
Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements
More informationPasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:
CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationJuly 31, University of Maryland Emergency Management Faculty Staff Essentials
July 31, 2015 University of Maryland Emergency Management Faculty Staff Essentials What is Emergency Management? 2 What is Emergency Management? The process of preparing for, mitigating, responding to
More informationCertification. What: Who: Where:
Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More information