WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION

Size: px
Start display at page:

Download "WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION"

Transcription

1 WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business Continuity in Volatile Global Climate New Surveys Reveal that Businesses Show Complacency, Lack Emergency Response Plans, Ignore Government Warnings Critical Actions for Chief Executive Officers New York, New York March 20, 2003 In terms of overall security in corporate America, little has changed since September 11, The war against terror now coupled with the war in Iraq requires that Chief Executive Officers, Chief Operating Officers and other C-level executives take immediate action to protect their organizations. We must recognize that the United States of America is vulnerable to attack, sabotage and espionage along with every state, municipality or community, said Ira A. Lipman, Chairman and President of Guardsmark, LLC. It is erroneous to make the assumption that we are safe just because we are in the United States of America. September 11, 2001, has clearly changed that, and with the war on Iraq, we need to understand that we must do more than ever before. Mr. Lipman recommends the following steps for senior executives: Ask the executive committee what conditions currently exist that would allow a successful, aggressive attack against the facility. Create an environment of cooperation and understanding about war, terrorism and the security mission. It is important to get all levels of the organization involved with this critical task. Have an immediate conference with the security director and give him or her what is needed to bring the security program to the appropriate level. The company must prepare a defense against the most credible threat that can impact business continuity. Dust off those security projects and recommendations that were rejected in previous years. Identify any departments that may have interfered with the security mission. The Chief Security Officer must have full, open communication with the CEO, COO or CAO. He or she needs access to the CEO in the case of a serious problem concerning policies or lack of funding.

2 Page 2 Methods to Secure the Workplace Businesses need front-line preparedness in the war on terrorism because they are on the front line. The 9/11 destruction of the World Trade Center showed that no target holds more appeal for terrorists than major corporate facilities. Workplaces remain top terrorist targets because of their high visibility, institutional symbolism and large concentrations of people. Private security is the first line of defense. There are three times as many private security officers as there are public safety officers. That means that private security forces are the ones most likely to provide the initial onsite response to a security breach or to a terrorist attack. Security is not a commodity. In order to create the most secure environment possible, a company should carefully choose the organization and the people responsible for protecting employees and corporate facilities. Following are steps that businesses should take to ensure a good front-line defense against potential terrorist attack or natural disaster: 1. Assess the Type of Risk the Company Faces Thoroughly review and analyze the types of risks that employees might face due to industry factors, geographic location, nature of occupation and all other key variables. Engage a risk-assessment team to assist with a security audit so that the company can be sure of getting a full, accurate assessment of its risks, as determined by professionals who have a thorough understanding of realworld threats. Implement and install the recommendations from the risk analysis. Failure to act on identified vulnerabilities can expose a company to legal liability. 2. Control Risk With Consistent Solutions Regulate access to business facilities. Gates, concrete barriers, bollards or even trees and planters can strengthen perimeter control around a building. Staff sensitive access points with trained security personnel. Install intrusion detection systems, or review existing systems and repair if necessary.

3 Page 3 Install durable locking hardware on all entrances and maintain strict control of all keys and pass cards. Install CCTV cameras at critical points throughout the facility. Log in all visitors by name, date, time and name of person visiting. Escort all visitors at all times. Reserve the right to inspect items carried in or out of the company premises. Prohibit any photography of the facility without company authorization. Protect and restrict access to elements of the organization that are sensitive to biological or chemical attacks, including water supplies, food preparation areas, and heating, ventilation and air conditioning systems. Identify shut-off controls for HVAC system. Include in the emergency response plan a specific person responsible for shutting down HVAC system in the event of a suspected chemical or biological attack. Ensure that all incoming mail and packages are handled at a centralized, secure location where they can be scrutinized. Inspect all incoming mail. Never accept unexpected packages. Positively identify all delivery personnel. Develop strict times for receipt of deliveries. Document all deliveries by time, date and name of delivery service. Remove all deliveries from the dock or delivery area immediately. Distribute and display U.S. postal information regarding suspicious packages. Mailroom employees should be trained to look for warning signs such as: Foreign substances Excessive postage Poorly written or incorrect addresses No return address, and Packages originating from an unfamiliar source Back up electronic and paper files in a secure, off-site location to help ensure business continuity. Include employee phone numbers and addresses. Establish an employee awareness program, ensuring that employees know whom to report to if they detect a suspicious person or incident.

4 Page 4 3. Implement Emergency Preparedness Plans Develop and practice an emergency response plan. Address acts of terror, including biological, chemical, radiological and conventional explosives attacks, as well as acts of violence in the workplace and natural disasters. Have a communication plan in place for contacting all employees in the event of disrupted phone service. Have an evacuation plan in place, taking into full account all relevant factors of building and site design. Designate a specific meeting location where personnel gather after evacuating the premises. Develop a building lockdown method to effectively complete the lockdown of the facility within 30 seconds. Develop specific plans to respond to any increase in homeland security threat levels. Develop a plan of communication and coordination with emergency response groups. Establish a liaison with emergency response groups. Know the capabilities and limitations of local emergency response groups. Assign responsibilities and identify successor personnel for essential tasks including evacuation, communication, fire safety and critical business operations. Communicate the preparedness plan to employees so each of them knows exactly what to do in case of evacuation. This briefing can take place during regularly scheduled safety and security meetings, coordinated by the security department, if applicable. Orchestrate frequent drills to ensure that employees not only know what to do but can also put that knowledge into action. Maintain adequate stores of basic supplies in the event that evacuation is not possible: e.g., drinking water, canned food, flashlights and batteries, and a transistor radio. These items can also support a skeleton staff remaining at the site. For larger organizations: Provide alternate communication methods, such as satellite telephones, to enable senior management to maintain contact if public communication is interrupted.

5 Page 5 4. Screen Employees Terrorist threats can come from inside an organization as easily as from outside. Today, companies must be especially alert to the danger of sleepers enemy agents who establish themselves in society until called into action. A thorough employee screening process should include verification of: Legal work status as permitted by law Work history Educational institutions and degrees earned Professional accreditation, driving and criminal records Credit history as permitted by law Personal references Military discharge status (where applicable) Businesses should remember to screen non-staff workers as well. This calls for special care in selecting vendors such as external auditors, food service providers, temporary employees, building maintenance services, etc. 5. Maintain Open Communications Communicate risk. A company s first priority should be to increase employees awareness that the risk of terrorism is real and convince employees that security plans and precautions should be taken seriously. Manage fear. A company should hold employee seminars and publish bulletins to raise employee awareness of potential threats and of the efforts management is taking to counter those threats because nothing combats fear of the unknown like knowledge. Organizations should encourage personnel to create a family plan to reduce employees concerns for loved ones in the event of an emergency. Establish a toll-free hotline or a message board on the company web site or intranet to allow employees to voice concerns, express fears and provide information to management. This communication helps security people do a better job and helps stifle rumors that could damage organizational morale and effectiveness. Being on the front line in the war on terrorism as businesses are is not easy. But if businesses follow these basic five steps, they can substantially reduce their security risks and create a more secure environment for employees in the event of either a terrorist attack or a natural disaster.

6 Page 6 New Surveys Reveal Ongoing Complacency Businesses throughout the United States ignore color-coded warnings from the federal government, lack solid emergency plans, and are generally unprepared for another terrorist attack, according to new surveys examining the security procedures and attitudes about security from hundreds of security directors and workers around the nation. The surveys, taken from interviews with corporate security professionals and the general public and released today by Guardsmark, one of the world's largest security service companies, found that although security professionals and the general public realize there is a threat of more terrorism, their companies are generally complacent about the importance of workplace security and protection. In fact, 70% of security professionals and 54% of the general public say that their companies are very complacent about the importance of good security. Other Key Findings: 58% of security professionals and 66% of the public perceive that security in the workplace is too loose and relaxed principally because there has not been any terrorism in the United States lately. More than half of the American people - 54% - report that their companies are not doing anything to prepare for what could happen over the next several weeks. At the same time, 96% say the threat from terrorism today is serious, and 62% say that a war with Iraq increases the possibility of terrorism. Just 41% of the public feels their workplace is very safe and just 33% feel that where their family members work is very safe. Complacency is the key word, according to Ira A. Lipman. Security professionals and the public are acknowledging that new threats are out there, but they widely agree that their companies are too complacent with their own security. Security Professionals and the General Public Feel Safer At Home Than At Work By a wide margin, the general public and security professionals feel safer at home than in the workplace. In fact, by an 8 to 1 margin, security professionals said they feel safer at home than at work. Only 9% of security professionals and 7% of the general public say they feel safer at work; 66% and 70% respectively say they feel safer at home.

7 Page 7 Companies Are Lacking Effective Emergency Response Plans In response to questions about the steps being taken by companies in terms of security and protection, security professionals and the general public say that many common security measures are not required at their companies % of security professionals responded that their companies are not creating backup facilities at other sites -- 45% are not conducting emergency drills -- 44% are not backing up files and documents at distant locales -- 41% are not creating more effective firewalls -- 40% have not conducted tighter background checks on new employees -- 6 in 10 security professionals say their companies are unprepared for a chemical or biological attack. Companies Unresponsive to Federal Government Warnings Companies are also ignoring warnings coming from the Department of Homeland Security. Less than 1/3-31% - say they take the Homeland Security Warning very seriously and a virtually identical number - 30% of security professionals and 27% of the general public - feel it is a very effective system. 61% of the public says a change in the colors does not lead to a change in policies or actions at their firm. First-Ever Guardsmark Security Index In the first-ever Guardsmark Security Index, commissioned because of the company s interest in determining perceptions and practice towards workplace security and based on the average responses of security professionals and the general public, companies received a score of 52 out of 100 based on the opinions from security professionals; companies received a 36 out of 100 based on responses from the general public. The indices are scored off of a scale of represents the perception that security arrangements have achieved optimal effectiveness; 0 represents the perception that the security arrangements have totally failed to achieve the desired results. Security professionals as well as the general public agree that businesses are not well prepared to face the increased threat of terrorism that would come as a result of war with Iraq, said Mr. Lipman. About the Guardsmark Security and Protection Surveys On behalf of Guardsmark, Penn, Schoen and Berland, a strategic marketing research firm, conducted 601 interviews among general population Americans, and 203 interviews with security professionals. The interviewing took place between Friday

8 Page 8 March 7, 2003 and Wednesday March 12, The margin of error of the general population sample is +/-3.99%. The margin of error of the security professionals sample is +/-6.92%. About Guardsmark, LLC Guardsmark operates in more than 400 cities throughout North America, employing 18,000 people, including more former FBI agents than any other company in the world. Guardsmark is the first security services firm to attain ISO 9001 registration at its U.S. home office and a growing number of branch offices. Ira A. Lipman, who founded Guardsmark in 1963, is the author of How to Protect Yourself From Crime, the most complete guide to self-protection in print. ### For further information or to arrange an interview, please contact: Jason Schechter, Lisa Wolford,

Security Guidelines for. Agricultural distributors

Security Guidelines for. Agricultural distributors Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole

More information

Todd & Cue Ltd Your Business Continuity Partner

Todd & Cue Ltd Your Business Continuity Partner Todd & Cue Ltd Your Business Continuity Partner Preparation and Planning We provide strategies, tools and resources to help you prepare for a business interruption whether it is caused by fire, water,

More information

Homeland Security for Schools: Threat Status Alert Worksheet

Homeland Security for Schools: Threat Status Alert Worksheet for Schools: Threat Status Alert Worksheet The Green Alert Status reflects a low risk of terrorist attacks. The primary goal of a safe school plan is to safeguard schools against crime, violence and disruption.

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

SFSMHS1 Receive mail safely and securely

SFSMHS1 Receive mail safely and securely SFSMHS1 Receive mail safely and securely Overview This standard sets out the skills, knowledge and understanding for mail handlers receiving mail of all types, doing so safely and securely, following organisational

More information

Every Business Should Have A Plan.

Every Business Should Have A Plan. Every Business Should Have A Plan. www.ready.gov Preparing Makes Good Business Sense. How quickly your company can get back to business after a terrorist attack or tornado, a fire or flood often depends

More information

Court Security Guidelines

Court Security Guidelines July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative

More information

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

New York State Unified Court System. Workplace Safety Assessment

New York State Unified Court System. Workplace Safety Assessment New York State Unified Court System Workplace Safety Assessment WORKPLACE SAFETY ASSESSMENT COURTHOUSE/FACILITY INFORMATION... 2 WORKPLACE SAFETY TRAINING PROTOCOLS... 3 Workplace Violence Policy, Exposure

More information

U.S. DoD Physical Security Market

U.S. DoD Physical Security Market U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

Business, Government & Community Continuity from A to Z Seminar Topics: Continuity Plan Considerations & Project Management Vital Records

Business, Government & Community Continuity from A to Z Seminar Topics: Continuity Plan Considerations & Project Management Vital Records Business, Government & Community Continuity from A to Z Seminar Topics: Continuity Plan Considerations & Project Management Compelling Case for Government & Business Continuity Planning Critical Functions

More information

Disaster Recovery. Tips for business survival. A Guide for businesses looking for disaster recovery November 2005

Disaster Recovery. Tips for business survival. A Guide for businesses looking for disaster recovery November 2005 Disaster Recovery Tips for business survival A Guide for businesses looking for disaster recovery November 2005 Page 1 of 9 Introduction The aim of this paper is to highlight the importance of having a

More information

IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness

IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives

More information

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES Definitions 1. In these requirements: C-NLOPB means the Canada-Newfoundland and Labrador Offshore Petroleum Board; Chief Safety Officer means

More information

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES Purpose and Scope The purpose of the Security Code of Management Practices is to help protect people, property, products, processes, information and

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

EMERGENCY PREPAREDNESS PLAN FOR

EMERGENCY PREPAREDNESS PLAN FOR EMERGENCY PREPAREDNESS PLAN FOR Name of Child Care Center Provided by: 2014 Emergency Preparedness Plan Page 1 TABLE OF CONTENTS Page I: Introduction... 3 II: Emergency Response Organization... 3 III:

More information

MAJOR PLANNING CONSIDERATIONS CHECKLIST

MAJOR PLANNING CONSIDERATIONS CHECKLIST MAJOR PLANNING CONSIDERATIONS CHECKLIST The following checklist is provided as a guide to assure that relevant considerations are identified in the emergency management planning process. Use the blank

More information

Hospital Emergency Operations Plan

Hospital Emergency Operations Plan Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,

More information

This document contains the text of Secretary of the State regulations concerning

This document contains the text of Secretary of the State regulations concerning 1 This document contains the text of Secretary of the State regulations concerning Emergency Contingency Model Plan for Elections (Sections 9-174a-1 to 9-174a-34) This document was created by the Office

More information

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants Adapted from information provided by the U.S. Department of Agriculture Food Safety and Inspection Service GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants March 2008 BY COMPLETING PAGE

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Introduction: Security Planning

Introduction: Security Planning Protecting Your Jewish Institution: Security Strategies for Today s Dangerous World 5 Introduction: Security Planning In order to create increasingly aware Jewish communal institutions, one must develop

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

UK SBS Physical Security Policy

UK SBS Physical Security Policy UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

MARULENG LOCAL MUNICIPALITY

MARULENG LOCAL MUNICIPALITY MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

Emergency Preparedness Guidelines

Emergency Preparedness Guidelines DM-PH&SD-P7-TG6 رقم النموذج : I. Introduction This Guideline on supports the national platform for disaster risk reduction. It specifies requirements to enable both the public and private sector to develop

More information

Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member

Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member City of Gainesville Inter-Office Communication April 3, 2012 TO: FROM: SUBJECT: Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member Brent

More information

City of Kenner Homeland Security

City of Kenner Homeland Security City of Kenner Homeland Security Community Continuity Guidelines for Business and Organization Facilities Risk Assessment/Risk Reduction and Emergency Preparation *This document was funded by the City

More information

Homeland Security from Citizens Perspective

Homeland Security from Citizens Perspective Page 1 of 7 Home > Programs > Homeland Security Project Homeland Security from Citizens Perspective Council Releases National Homeland Security Recommendations Action for all Levels of Government, First

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Comparison of Joint Commission and Healthcare Facilities Accreditation Program (HFAP) Emergency-Related Standards for Hospitals.

Comparison of Joint Commission and Healthcare Facilities Accreditation Program (HFAP) Emergency-Related Standards for Hospitals. Comparison of Joint Commission and Healthcare Facilities Accreditation Program (HFAP) Emergency-Related Standards for Hospitals Planning Activities Emergency Plan Joint Commission The hospital must engage

More information

Overview of the Maryland Threat Alert System and Guidance for Citizens, Businesses, and Schools

Overview of the Maryland Threat Alert System and Guidance for Citizens, Businesses, and Schools Overview of the Maryland Threat Alert System and Guidance for Citizens, Businesses, and Schools Maryland Emergency Management Agency Office of Domestic Preparedness November 25, 2002 EFFECTIVE DATE: 16

More information

Global Security Program Overview

Global Security Program Overview STATE STREET GLOBAL SECURITY Global Security Program Overview ASIS International Kansas City Chapter March 5, 2015 Stephen D Baker CPP Vice President & Deputy Chief Security Officer About State Street

More information

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint

More information

Fire and Emergency Services Preparedness Guide for the Homeland Security Advisory System. First Edition - January 2004

Fire and Emergency Services Preparedness Guide for the Homeland Security Advisory System. First Edition - January 2004 Fire and Emergency Services Preparedness Guide for the Homeland Security Advisory System First Edition - January 2004 United States Fire Administration FIRE AND EMERGENCY SERVICES PREPAREDNESS GUIDE FOR

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

Is your business ready for a disaster? Ten questions to help you determine the answer.

Is your business ready for a disaster? Ten questions to help you determine the answer. Is your business ready for a disaster? Ten questions to help you determine the answer. 1. Does your company have a current emergency preparedness plan that addresses all types of business disruptions?

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Business Continuity Planning (BCP) / Disaster Recovery (DR)

Business Continuity Planning (BCP) / Disaster Recovery (DR) Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

ALLEN COUNTY CODE TITLE 8 PUBLIC SAFETY ARTICLE 8 COUNTY EMERGENCY MANAGEMENT AGENCY (EMA)

ALLEN COUNTY CODE TITLE 8 PUBLIC SAFETY ARTICLE 8 COUNTY EMERGENCY MANAGEMENT AGENCY (EMA) ALLEN COUNTY CODE TITLE 8 PUBLIC SAFETY ARTICLE 8 COUNTY EMERGENCY MANAGEMENT AGENCY (EMA) 8-8-1 Chapter 1: Title This Ordinance shall be known and may be cited and referred to as the Emergency Management

More information

Evacuation Procedures

Evacuation Procedures Evacuation Procedures CONTENTS Evacuation Procedures... 1 When Alarm Sounds... 2 Evacuation Routes... 2 Accounting for Employees/Visitors after Evacuation... 3 Emergency Contact Information... 3 Advanced

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Module 14 Handling Emergency Situations

Module 14 Handling Emergency Situations Handling Emergency Situations The Shift Lead protects the team, customers and restaurant by monitoring safety. However, you cannot always prevent problems. Sometimes, things happen that you were not expecting

More information

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0 MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:

More information

EMERGENCY PROCEDURES

EMERGENCY PROCEDURES EMERGENCY PROCEDURES In an Emergency Call 911 Using County Telephone System Call 9-911 Fresno County Sheriff 600-3111 Fresno County Security 600-6785 TABLE OF CONTENTS Introduction 3 Accidents 4 Serious

More information

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM Business Security Tips Smarter Ways To Help Protect Your Business / Deterrence / is smarter deterrence external threats Make It Difficult For Criminals To Get Into Your Business. Locks, Lighting And Landscaping

More information

Crisis Management Guide

Crisis Management Guide Crisis Management Guide The Crisis Management Guide has been designed to help your company effectively respond to a crisis situation. Crises, large and small can be minimized if a thorough Crisis Management

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS

CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS A L L I A N C E F O R H U M A N S E R V I C E S www.alliance4hs.org CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS ALLIANCE FOR HUMAN SERVICES & MIAMI-DADE COUNTY OFFICE OF

More information

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt. TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT

More information

Silent Safety: Best Practices for Protecting the Affluent

Silent Safety: Best Practices for Protecting the Affluent Security Checklists Security Checklists 1. Operational Security Checklist 2. Physical Security Checklist 3. Systems Security Checklist 4. Travel Protocol Checklist 5. Financial Controls Checklist In a

More information

Disaster Recovery Plan (Business Continuity) Template

Disaster Recovery Plan (Business Continuity) Template Brochure More information from http://www.researchandmarkets.com/reports/2786932/ Disaster Recovery Plan (Business Continuity) Template Description: The Disaster Planning Template is over 200 pages and

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

READY NEW YORK FOR BUSINESS

READY NEW YORK FOR BUSINESS READY NEW YORK FOR BUSINESS New York City Office of Emergency Management New York City Department of Small Business Services www.nyc.gov/sbs Michael R. Bloomberg, Mayor Joseph F. Bruno, Commissioner Robert

More information

UFF Position Statement: Fire and Smoke as a Weapon

UFF Position Statement: Fire and Smoke as a Weapon UFF Position Statement: Fire and Smoke as a Weapon According to the United States Department of Homeland Security, international terrorist groups and violent extremists have shown interest in using fire

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

Statement of objective MALLS & MULTIPLEXES

Statement of objective MALLS & MULTIPLEXES //1// Statement of objective Security is an important factor today and in establishments that have large numbers of people visiting; it is necessary that they have a basic infrastructure of security. With

More information

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) Appendix A -- Minimum Security Standards for Level Federal

More information

PSPSOHS606A Develop and implement crisis management processes

PSPSOHS606A Develop and implement crisis management processes PSPSOHS606A Develop and implement crisis management processes Revision Number: 1 PSPSOHS606A Develop and implement crisis management processes Modification History Not applicable. Unit Descriptor Unit

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management State of New Hampshire Division of Homeland Security and Emergency Management Effective Solutions for Increased Security in NH Public Schools 33 Hazen Drive Concord, NH 03305 Effective Date: June 25, 2014

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Creating a Business Continuity Plan

Creating a Business Continuity Plan Family Office Information Creating a Business Continuity Plan Hurricanes, fires, terrorist attacks, earthquakes and tsunamis aren t the only kinds of events that can cripple a family office. More common

More information

The 10 Minute Business Continuity Assessment

The 10 Minute Business Continuity Assessment How would your business cope if an emergency evacuation was needed and you couldn t return for a week, or it suffered a serious flood? What would you do if a staff syndicate quit their jobs after winning

More information

Schedule 13 - NHS Counter Fraud and Security

Schedule 13 - NHS Counter Fraud and Security 1. In this Schedule 13: Schedule 13 - NHS Counter Fraud and Security 1.1 CFSMS means the Special Health Authority established by the Counter Fraud and Security Management Service (Establishment and Constitution

More information

RISK AND DISASTER MANAGEMENT: SOME USEFUL TOOLS AND RESOURCES FOR BUSINESSES AND ORGANISATIONS

RISK AND DISASTER MANAGEMENT: SOME USEFUL TOOLS AND RESOURCES FOR BUSINESSES AND ORGANISATIONS RISK AND DISASTER MANAGEMENT: SOME USEFUL TOOLS AND RESOURCES FOR BUSINESSES AND ORGANISATIONS MAY 2011 Sector Development Team Queensland Council of Social Service Inc DEVELOPING A BUSINESS CONTINUITY

More information

EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam

EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of

More information

THE RENAL NETWORK, INC.

THE RENAL NETWORK, INC. THE RENAL NETWORK, INC. (ESRD NETWORK ORGANIZATION # 9/10) EMERGENCY PREPAREDNESS AND RESPONSE PLAN CENTERS FOR MEDICARE AND MEDICAID SERVICES Contract Number: HHSM-500-2006-NW09 HHSM-500-2006-NW10 Version

More information

Aide-Mémoire Suspicious Objects and Bombs

Aide-Mémoire Suspicious Objects and Bombs Aide-Mémoire Suspicious Objects and Bombs Terrorists, criminals and dissatisfied individuals continue to make use of improvised explosive device (homemade bombs). These incidents involving shocking acts

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

Power plant safety: a wise business move

Power plant safety: a wise business move Power plant safety: a wise business move Power plant safety: a wise business move Going to work in a controlled and safe environment is not an unreasonable expectation for any worker. In many occupations,

More information

CARVER+Shock Vulnerability Assessment Tool

CARVER+Shock Vulnerability Assessment Tool Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure

More information

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting

More information

Locations. Dates. Registration Form. System Security Awareness for Transit Employees and Security Incident Management for Transit Supervisors

Locations. Dates. Registration Form. System Security Awareness for Transit Employees and Security Incident Management for Transit Supervisors System Security Awareness for Transit Employees and Security Incident Management for Transit Supervisors Locations. Dates Columbus, Ohio July 22 Houston, Texas July 26 Norfolk, Virginia July 29 Concord,

More information

Mass Gatherings Medical Strategies for Weapons of Mass Destruction

Mass Gatherings Medical Strategies for Weapons of Mass Destruction Mass Gatherings Medical Strategies for Weapons of Mass Destruction Kristi L. Koenig, MD, FACEP Professor of Clinical Emergency Medicine Director of Public Health Preparedness Co-Director, EMS and Disaster

More information

BUSINESS CONTINUITY PLAN OVERVIEW

BUSINESS CONTINUITY PLAN OVERVIEW BUSINESS CONTINUITY PLAN OVERVIEW INTRODUCTION The purpose of this document is to provide Loomis customers with an overview of the company s Business Continuity Plan (BCP). Because of the specific and

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

Why Crisis Response and Business Continuity Plans Fail

Why Crisis Response and Business Continuity Plans Fail Why Crisis Response and Business Continuity Plans Fail 10 Lessons Learned from Real-World Experience Many organizations invest considerable time, money and effort in developing Crisis Response and Business

More information

Business Continuity Planning Assessment

Business Continuity Planning Assessment Business Continuity Planning Assessment www.cheshirefire.gov.uk Every business is at risk of disruption from a variety of threats, as well as fire, these threats can include flood, loss of power or even

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

National Infrastructure Protection Center

National Infrastructure Protection Center National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities

More information

DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning

DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning Your Documents. Our Management. DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning Dr. Robert L. Bailey, CRM, MIT, ECMp L E A R N M O R E A B O U T D A S T A A T W W W. D R M.

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information