City of Kenner Homeland Security

Size: px
Start display at page:

Download "City of Kenner Homeland Security"

Transcription

1 City of Kenner Homeland Security Community Continuity Guidelines for Business and Organization Facilities Risk Assessment/Risk Reduction and Emergency Preparation *This document was funded by the City of Kenner and prepared by the Center for Hazards Assessment, Response and Technology at the University of New Orleans.

2 Your business or organization is housed in or actually manages an office building, school, store, church, shopping mall, warehouse, manufacturing plants, government building, to name common facilities. Because of your location and responsibilities, you have a strong vested interest in identifying physical and biological risks that can threaten your site. You are also concerned with reducing the facilities vulnerability to risks. And, in the unfortunate situation that something serious might happen there, you want to be prepared for an emergency incident. To make the commitment to do these things is not easy. First, to identify risks before a serious event occurs is a psychologically and financially challenging effort. When nothing has yet occurred you ask, why should an investment be made of time, effort and organization resources? 9/11 and recent terrorist acts have unfortunately made this question less difficult to answer. Now it is clear that whatever risks can be reduced in a reasonable, systematic and efficient way (covering as many types of hazards jointly) with all due precautions to citizen rights, it is wise to consider doing so. While risk assessment/reduction activities are not so clearly compelling focused directly on saving lives) as is emergency preparation, the two types of efforts are strong allies. Whomever and whatever you remove from possible harm, will not need to be rescued and rehabilitated. In this spirit we offer you the following general guidelines for risk assessment/reduction and emergency response preparation. 2

3 General Risk Assessment / Risk Reduction* 1. Evaluate access to property. Evaluate access to property. This includes both clarifying number of needed entrances and reducing the number of unlocked entrances if at all possible while remaining in compliance with building codes and access laws. For Visitors: consider requiring all visitors to enter through one specific entry. For Employees: consider reducing the number of unlocked or unattended entries/exits they can use; limit the number of unlocked/ unattended doorways; discourage employees from propping doors open while unattended. For Suppliers/Vendors: consider requiring them to enter through one specific point. Determine if some exits can be converted to emergency only exits in which an alarm sounds if opened. Consider delayed opening on emergency doors where permitted. Have employees, visitors, clients, and vendors park in designated areas and control access to onsite parking. Require employees to display parking decals on their vehicles. If appropriate, require visitors, clients, and vendors to display a visitor parking decal. Consider enclosing property with fence and limited access gates. Access should be limited to those persons who have legitimate reasons for being 1 in the facility. The wearing of employee identification cards will help to insure this condition. Confirm that identification is collected from former employees as part of the employee exit procedures. Monitor access to facilities. Staff entrance(s) with greeters (the Wal-Mart method) to permit identification of appropriate users and to discourage others from entering because of the presence of the person. If necessary, utilize security guards or electronic locks. o Develop written standard operating procedures for handling unwanted guests. Distinguish between mandatory and optional procedures. Include legal staff in drafting these procedures to ensure that the correct language is utilized. o Train staff on how to follow standard operating procedures and how to enforce them. * Please keep in mind that the following recommendations are general in nature. Some of the suggestions may not be relevant to your business or facility. 3

4 Where appropriate, have visitors, clients, and/or vendors sign in and receive company visitor identification (for individuals and their vehicles). Where appropriate, have visitors, clients, and/or vendors escorted by an employee during their time in the facility. Consider implementing a key card system to restrict access to areas containing hazardous materials and/or confidential information. (Evaluate levels of vulnerability in your facility. Higher levels of vulnerability will need higher levels of security.) Consider the use of security cameras at all entrance points and inside the facilities (where there is no reasonable expectation of privacy) and realtime monitoring of these images by security personnel. Install alarms at all possible entrance points to also indicate any illegal entry. o Have security personnel monitor the facility s grounds and parking areas in addition to the facility s structure. Utilize good exterior lighting of building s (access points) and outdoor area to discourage unlawful entrance. Identify possible means of access to electrical and ventilation system. Take steps to prevent any unauthorized access to air intakes, exhausts and power source. Keep building plans secure from unauthorized access. Identify official responsible for storing plan and for maintaining list of who has copies of plan or access to its storage location on or off site. 2. Establish mail-opening procedures. Limit mail opening to employees only. Limit number of employees who open mail. Restrict mail-opening activities to specific area within the facility. If possible, place your mailroom close to loading dock to limit the transport of packages through the facility. All mail should be worked in a location that can be isolated both physically and mechanically (mechanically refers to HVAC systems) in the case of a threat or release. Educate staff to recognize suspicious packages and provide training on the proper procedures to follow if a suspicious package is identified. Refer to the U.S. Postal Service s recommendations for general mail operation. 3. Evaluate the condition and operation of the building heating, ventilation and air conditioning system (HVAC). Assess facility's ventilation system to determine how chemicals might be introduced into it. Secure access to such locations. Specify those employees who are authorized to access these locations and make certain that these employees are clearly identified in advance. 4

5 If a chemical were released into the system, determine if and how such plume could be quickly contained (e.g., emergency shut-down procedures). Identify and train employees to manipulate system to quickly clear or slow the spread of a chemical or biological agent. Establish or modify evacuation procedures such that, in case of an indoor release, employees, customers, visitors, etc. should know where to exit the building and congregate upwind at least 700 feet away. Create safe areas through modification of the air system in case of an outdoor hazardous release. Test modifications for functionality and retest on recommended schedules. Upgrade particle filters to reduce the risk of spreading biological agents via the air system and seal gaps to prevent other means of contamination. Consider separate air exhaust systems for high-risk locations such as mailrooms or loading docks to reduce spread of any hazardous agent. Weatherize the building by sealing any cracks around doors and windows to reduce possible outdoor contaminants from entering the building. Consider the energy conservation benefits in addition to security measures. 4. Consider the presence/circulation of onsite hazardous chemicals. Conduct and maintain a current inventory of hazardous chemicals that are stored on site such as cleaning chemicals, large amounts of raw materials, etc. If possible, consider alternate processes that would utilize lower quantities of or less dangerous hazardous chemicals or less pressurized systems. Ensure that chemicals are properly labeled and stored. o Verify that the labels include instructions in the event of an emergency. o Assess if the materials are still needed, or needed in the amounts stored. Ensure that there is not an excessive or inappropriate amount of hazardous material being stored. Restrict access to hazardous materials, where appropriate. Store in a secured location (locked) and limit access to designated employees. Keep a file of Material Safety Data Sheets (MSDS) on any chemical stored on site in a large or reportable quantity federal regulations. MSDS can be obtained through the chemical manufacturer. If reportable quantities of a hazardous chemical are stored on site, make sure to follow all federal regulations (e.g. SARA Title III, Tier II, 29 CFR , etc.) regarding the handling and reporting of these chemicals. 5

6 5. Develop data and computer equipment protection procedures. Establish procedures to backup and recover computer data. The computer equipment can be replaced but once lost, your data is gone forever without some type of backup and recovery plan in place. Utilize cds for long-term storage of data. Alternatively, data can be backed up across a network to a computer located at a secure off-site location. The latter option can be provided by a commercial service or another branch of the business. Consider the use of backup and recovery software that will automate the backup process. Protect backup media (cds or tapes) by storing in a fireproof container, vault, or at an off-site location. Daily backups should be performed on a rotated set of media providing multiple days of backups and a point-in-time recovery option. The following is a recommended media rotation schedule: Daily: Utilize one set of medial for each day of the week, Monday through Thursday. Backups should be made at the end of each day and clearly labeled. Weekly: Set aside a rotating set of media for five weekly backup sets. Backups should be made at the end of every week on Friday. Utilize new media for each Friday of the month. Recycle set every month. Monthly: Keep three sets of media for monthly backups that follow the same process as weekly backups. Backups are made at the end of every month copying over the oldest monthly media. Yearly: Backup data at the end of each fiscal and calendar year. These backups should be logged and securely filed. These backups should be kept permanent records and should not be recycled. Consider the useful life of media and systematically replace according to the manufacturer s recommendations. Test the backup and recovery process. Periodically verify that the process and media are in fact working by retrieving a file from the backup as a test. These tests will reveal any problems caused by deteriorating media or improper configurations of the backup software. Protect data against deliberate internal and external attacks. Create a firewall using software or hardware to protect against unauthorized entry into the network. This is especially critical with high speed always-on internet connections provided by cable modems and DSL. Configure all computers on the network to require passwords. Passwords should be considered confidential and should be changed regularly. Physically locate computer equipment in areas of controlled access to guard against theft and/or unauthorized access. 6

7 Protect against computer viruses. Microsoft releases frequent updates or patches to correct security loopholes in its Windows operating systems. Download and install all available patches and check for new ones often. Install anti-virus software and keep it updated. Avoid opening attachments from unknown parties. Avoid unnecessary downloading of information directly to the pc or file swapping with outside sources. Refrain from downloading free programs, screen savers, or other applications unless they are from known safe sources. Sometimes known as shareware, these applications may contain codes to capture keystrokes and otherwise monitor your activity, potentially exposing credit card or other personal information. Establish procedures to protect computer equipment. To protect computer equipment and peripherals from electrical power fluctuations, connect them to an uninterruptible power supply (UPS). In addition to providing protection against power problems, a UPS can keep a computer running during a blackout long enough to affect a controlled shutdown. To protect computer equipment in the event of extreme weather conditions, consider shutting down equipment and disconnecting it from power, network, and telephone connections. In addition, elevate equipment and cables and move away from windows and doors. Consider special fire suppression systems in records rooms where sprinkler systems (water) will destroy what is being protected. 7

8 General Emergency Preparation 1. Develop a written Emergency Plan that covers more than just fire. This will require the following steps: Establish a planning team (include all levels of management, labor, human resources, engineering and maintenance, safety, health and environmental affairs, public information officer, security, community relations, sales and marketing, legal and finance and purchasing). Establish a timeline for the planning and implementation of the plan. Develop a budget to include plan development, printing, training, and other necessary expenses including costs of research, seminars, consulting services, etc. Identify applicable federal, state, local regulations and organizational policies. Consider Occupational Safety and Health Administration (OSHA) regulations, environmental regulations, fire codes, transportation regulations, zoning regulations, and corporate policies if applicable. o Assess whether the facility conforms to these regulations and policies and whether these regulations and policies are adequate to manage the identified risks. If they are not adequate, determine what additional measures or resources are needed. Identify internal resources that could be utilized in an emergency and assign responsibilities. Personnel: o Who will be responsible for the following: directing evacuations; public relations; employee relations; onsite emergency operations (damage assessment, salvage and repair operations; fire suppression; internal hazardous materials response team, first aid, security). Equipment: o What support/backup systems are available: emergency power equipment; communications equipment (phone, fax, internet); fire protection and suppression equipment; warning systems; first aid supplies; preliminary decontamination equipment. Establish critical incident scenarios most likely to occur within the facility. Develop emergency plans based on the possible scenarios such as: o Facility partially destroyed due to fire, flood, or other event o Facility contaminated via ventilation system o Employees quarantined at home and unable to work for 3 weeks o Facility becomes part of crime scene investigation (e.g. shooting at work) 8

9 Consider location and other factors unique to the facility throughout the planning process. Determine if building is located within a vulnerable zone (near transportation lines, chemical plants, etc.) Include key employees in the planning stages. Keep all employees informed about the overall process including their roles in the Plan. Also include local emergency officials in the planning process. 2. The Emergency Plan should include: A list of Emergency Response Team members and their specific responsibilities. The team should be well trained on applicable emergency legal standards for emergency response (e.g., 29 CFR , NFPA 472, and OSHA standards). Specific responsibilities may include: o main decision-making (should the building be evacuated, etc.); o contacting authorities (fire department, police, etc.); o providing instructions to building occupants; o controlling the HVAC system as needed (to reduce spread of airborne hazardous materials), o establishing/coordinating first aid activities, o fire brigade, o hazardous materials response team o security o public information officer o coordinator with government representatives (in case of curfew, EPA hazards, OSHA concerns, etc.) A written chain of command for the Emergency Response Team including names and titles of employees responsible for each task. A Communications Plan. Create an emergency call list of all people on and off-site who would be involved in responding to an emergency. Each member of the Emergency Response Team should have copy of the contact list at work and at home. Post emergency 24-hour telephone numbers at facilities in highly visible areas. Provide these numbers to Team members and local response officials. Train employees and post procedures for communications during a potential emergency situation. o Develop and post procedures to warn employees, customers, visitors, etc. of a potential emergency situation. o Establish procedures for personnel to communicate with emergency responders and corporate office if applicable in the event of an emergency. Provide detailed directions on how to report various types of emergencies (include agency/person to contact and what information to provide). o Establish method for contacting employer to determine employee work status in the wake of an emergency 9

10 Plan for alternative means of communication in case phone system is down and cellular phones are not operational (e.g. runners, satellite phones, twoway radios). Building and site maps that include utility shutoffs, circuit breakers, and substations water hydrants, water main valves, water lines, gas main valves, gas lines, storm drains, sewer lines, location of building, floor plans, alarm and enunciators, fire extinguishers, exits, stairways, designated escape routes, restricted areas, hazardous materials o Including lists of any toxic materials that may be harmful to humans or the environment, storage procedures, handling/cleanup procedures, utilization procedures, and first aid procedures. The records and database for facilities and equipment should be located in one, secure location and a chain of command should be established for access with more than one person with access and familiarity of the documents. An Evacuation Plan. Develop and post floor plans clearly indicating emergency escape routes and safe areas. Make sure that plan complies with and addresses all fire codes (i.e. requirements for signage, lighting, storage). Include procedures for accounting for all individuals including non-employees in the facility. Designate a meeting site outside the facility for employees. Establish employee groups. Identify person(s) responsible in each group for accounting for members of that group. Provide copy of plan to appropriate employees and inform employees of location of the safely stored document. Share plan and information with other corporate locations. Regularly review plan and update as necessary to reflect current events and technological advances Evaluate existing emergency related policies and procedures. Does the organization have: A building/plant closing policy that contains clearly written instructions for shutting down equipment and other business activities and list those who are responsible for these tasks in case of an emergency. A hazardous materials policy that lists any toxic materials that may be harmful to employees, customers and surrounding area. Maintain Material Safety Data Sheets (MSDS) on these materials describing necessary precautions in handling, storing, and utilizing them. These Material Safety 10

11 Data Sheets will also contain related first-aid procedures. MSDS can be obtained through the manufacturer of the material(s). Regularly scheduled safety and health programs for all employees. Fire protection procedures to avoid potential fires and to extinguish them if possible. Finance and purchasing procedures for activities related to emergency preparedness including purchasing necessary equipment and training personnel. Identify those activities that be contracted for in advance of an emergency event such as transportation needs. Insurance programs that will allow a business to fully recover in the event of an emergency event. If these policies and procedures do not exist, it is recommended that they be created in conjunction with the emergency plan. 3. Conduct training and emergency drills/exercises. Require that all employees to attend regularly schedule orientation and education sessions. Provide information about threats, hazards, and protective actions. Review emergency plan with all employees and provide an outline of the plan to them. Inform employees of their roles and responsibilities during an emergency and survey each of them on their level of knowledge. Prepare checklists for all offices. Include local emergency management officials in presentation of plan to employees. Frequently conduct emergency drills. Types of drills include: Tabletop (discussion of plan in action) for Emergency Response Team members Functional Exercises (simulate real emergency in walk-through drill) Full-Scale Exercises (using actual equipment and in the case of very large organizations, local Office of Emergency Preparedness officials and first responders should be included) Evaluate drills for strengths and weaknesses. Determine if any additional resources are needed. Evaluate coordination efforts to reveal any means of improvement. Verify that the roles and responsibilities of each employee are clearly specified and understood. Determine if drills are conducted in a timely manner. Monitor responses in terms of incident command system. If necessary, revise plan to reflect lessons learned during exercises. 11

12 Acknowledgments We would like to acknowledge the assistance of the following individuals in the development of this document: Ann S. Angelheart, Hartman Engineering, Inc., William C. Nicholson, Solutient, Inc, and David Tibbets. References The Appropriate and Effective Use of Security Technologies in U.S. Schools: A Guide for Schools and Law Enforcement Agencies. National Institute of Justice Research Report. Critical Infrastructure Protection R & D. Critical Infrastructure Assurance Office. Emergency Management Guide for Business and Industry. Federal Emergency Management Agency. Emergency Response Guidebook. Department of Transportation. Emergency Responder Guidelines. Office for Domestic Preparedness. 1 August Hospital Disaster Plan. Wisconsin Department of Health & Family Services. Lawrence Berkeley National Laboratory. Advice for Safeguarding Buildings Against Chemical or Biological Attack. Indoor Environment Department. Millar, Fred. Ten Action Steps for Parents, Teachers and School Officials. Worst Case Scenario: Terrorism and Industrial Chemicals Solutient, Inc. October, Computer Systems Disaster Preparation and Recovery, Steps to Reduce Your Risk. United States Postal Service; ( Occupational Safety & Health Administration, U.S. Department of Labor 12

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

MAJOR PLANNING CONSIDERATIONS CHECKLIST

MAJOR PLANNING CONSIDERATIONS CHECKLIST MAJOR PLANNING CONSIDERATIONS CHECKLIST The following checklist is provided as a guide to assure that relevant considerations are identified in the emergency management planning process. Use the blank

More information

SAFETY GUIDANCE MATERIAL

SAFETY GUIDANCE MATERIAL SAFETY GUIDANCE MATERIAL SAFETY MANAGEMENT MONDAY MARCH 23,GUIDANCE 2015 This safety resource was written for the scrap industry by the scrap industry and was developed to assist you in making your scrap

More information

Ten Steps for Preventing a terrorist Attack

Ten Steps for Preventing a terrorist Attack WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business

More information

Todd & Cue Ltd Your Business Continuity Partner

Todd & Cue Ltd Your Business Continuity Partner Todd & Cue Ltd Your Business Continuity Partner Preparation and Planning We provide strategies, tools and resources to help you prepare for a business interruption whether it is caused by fire, water,

More information

Template for BUSINESS CONTINGENCY PLAN

Template for BUSINESS CONTINGENCY PLAN Template for BUSINESS CONTINGENCY PLAN EFFECTIVE DATE: [effective_date] DISCLAIMER The materials presented herein are for general reference only. Federal, state or local laws or individual circumstances

More information

How To Handle An Emergency

How To Handle An Emergency Company Name Address Telephone Contact Name Title Last Revision Date Policy and Organizational Statements Identify the goals and objectives for the emergency response plan. Define what your emergency response

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

Morton Insurance & Risk Management Business Continuity Planning Services Portfolio

Morton Insurance & Risk Management Business Continuity Planning Services Portfolio Morton Insurance & Risk Management Business Continuity Planning Services Portfolio Are you prepared for a business emergency? Our business continuity plan and guide will help you create a policy to prepare

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants Food Defense Self-Assessment Checklist for Slaughter and Processing Plants Outside Security 1. What food defense measures does your plant have in place for the exterior of the building? Are the plant s

More information

Fire Safety Risk Assessment Checklist for Residential Care Premises

Fire Safety Risk Assessment Checklist for Residential Care Premises Checklist for Residential Care Premises Name of Premises: Address of Premises: Name of Responsible Person: What area / location does the assessment cover? Does the assessment cover the whole site YES or

More information

Emergency Preparedness Guidelines

Emergency Preparedness Guidelines DM-PH&SD-P7-TG6 رقم النموذج : I. Introduction This Guideline on supports the national platform for disaster risk reduction. It specifies requirements to enable both the public and private sector to develop

More information

Evacuation Procedures

Evacuation Procedures Evacuation Procedures CONTENTS Evacuation Procedures... 1 When Alarm Sounds... 2 Evacuation Routes... 2 Accounting for Employees/Visitors after Evacuation... 3 Emergency Contact Information... 3 Advanced

More information

Implementation Date: May 5, 2009. Table of Contents. Section Description Page. 1.0 Description 1. 2.0 Initial Response 2

Implementation Date: May 5, 2009. Table of Contents. Section Description Page. 1.0 Description 1. 2.0 Initial Response 2 Recommended by Emergency Preparedness Committee: April 21, 2009 Recommended by President s Council: May 1, 2009 Approved by Executive Committee: May 5, 2009 NAIT Procedures CS1.2.6 Flood Implementation

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Every Business Should Have A Plan.

Every Business Should Have A Plan. Every Business Should Have A Plan. www.ready.gov Preparing Makes Good Business Sense. How quickly your company can get back to business after a terrorist attack or tornado, a fire or flood often depends

More information

Fire Risk Assessment Safety Checklist

Fire Risk Assessment Safety Checklist Fire Risk Assessment Safety Checklist This checklist has been prepared to help you comply with The Regulatory Reform Fire Safety Order 2005 What is the Regulatory Reform (Fire Safety) Order 2005? The Regulatory

More information

READY NEW YORK FOR BUSINESS

READY NEW YORK FOR BUSINESS READY NEW YORK FOR BUSINESS New York City Office of Emergency Management New York City Department of Small Business Services www.nyc.gov/sbs Michael R. Bloomberg, Mayor Joseph F. Bruno, Commissioner Robert

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

EMERGENCY PREPAREDNESS PLAN FOR

EMERGENCY PREPAREDNESS PLAN FOR EMERGENCY PREPAREDNESS PLAN FOR Name of Child Care Center Provided by: 2014 Emergency Preparedness Plan Page 1 TABLE OF CONTENTS Page I: Introduction... 3 II: Emergency Response Organization... 3 III:

More information

FACILITY AND VENUE PROTECTION

FACILITY AND VENUE PROTECTION FACILITY AND VENUE PROTECTION INTRODUCTION In late 2001, the Department of Homeland Security was created to develop and coordinate the implementation of a comprehensive national strategy to secure the

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Physical and Environmental Protection April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants Adapted from information provided by the U.S. Department of Agriculture Food Safety and Inspection Service GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants March 2008 BY COMPLETING PAGE

More information

ministry operations fire safety relocations designations evacuation bomb threat closure operations back-up of records weather policy

ministry operations fire safety relocations designations evacuation bomb threat closure operations back-up of records weather policy Continuity Of Operations Plan or COOP Planning No one expects a disaster. Yet, if your congregation or school were to experience a disaster: a fire, electrical storm, tornado, hurricane, bio-hazard spill

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Disaster Ready. By: Katie Tucker, Sales Representative, Rolyn Companies, Inc

Disaster Ready. By: Katie Tucker, Sales Representative, Rolyn Companies, Inc By: Katie Tucker, Sales Representative, Rolyn Companies, Inc Are you and your facility disaster ready? As reported by the Red Cross, as many as 40 percent of small businesses do not reopen after a major

More information

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN INTRODUCTION The need for a contingency plan for business interruptions is vital to the operations of the BNA Federal Credit Union. Without such a plan,

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Sample Emergency and Critical Incident Policy and Procedure

Sample Emergency and Critical Incident Policy and Procedure Sample Emergency and Critical Incident Policy and Procedure 1. Purpose and Scope Emergencies and critical incidents in the workplace can affect people physically and psychologically, and affect program

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

MCR Checklist for Automated Information Systems (Major Applications and General Support Systems)

MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) Name of GSS or MA being reviewed: Region/Office of GSS or MA being reviewed: System Owner: System Manager:

More information

FLA S FIRE SAFETY INITIATIVE

FLA S FIRE SAFETY INITIATIVE Improving Workers Lives Worldwide FLA S FIRE SAFETY INITIATIVE Preventing fires and saving lives by empowering workers and factory managers SCENARIO 1 OCCURS AT FACTORY ABC, WHICH HAS NOT IMPLEMENTED NECESSARY

More information

FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS. 1. All Floors (inspect from top floor to basement): Yes No

FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS. 1. All Floors (inspect from top floor to basement): Yes No General Inspection FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS 1. All Floors (inspect from top floor to basement): Yes are fire exits and directional signs properly illuminated? is the emergency

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and

More information

Best Practices For. Supply Chain Security

Best Practices For. Supply Chain Security Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Guide to Computer Forensics and Investigations, Second Edition

Guide to Computer Forensics and Investigations, Second Edition Guide to Computer Forensics and Investigations, Second Edition Chapter 3 The Investigator s Office and Laboratory Objectives Understand computer forensics lab certification requirements Determine the physical

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

18 EMERGENCY PREPAREDNESS

18 EMERGENCY PREPAREDNESS 18 EMERGENCY PREPAREDNESS QUIZ 1 (20 POINTS) True/False (5 points) 1. Ultimately, the responsibility for emergency planning lies with the safety and health professional. 2. The first eight minutes that

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

EMERGENCY MANAGEMENT IN SCHOOLS

EMERGENCY MANAGEMENT IN SCHOOLS EMERGENCY MANAGEMENT IN SCHOOLS Michelle Roberts and Mark Stephens Emergency and Security Management Branch Department of Education and Training Victoria Paper presented at the The Role of Schools in Crime

More information

The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division

The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division WILLIAM C. THOMPSON, JR. Comptroller Follow-Up Report on the New York City Fire Department Arson Information

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

Hospital Emergency Operations Plan

Hospital Emergency Operations Plan Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

Business Continuity Template

Business Continuity Template Emergency Management Business Continuity Template The Regional Municipality of Wood Buffalo would like to give credit to the Calgary Emergency Management Agency (CEMA) and the Calgary Chamber of Commerce

More information

Home Security Assessment Checklist DATE

Home Security Assessment Checklist DATE Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.

More information

WHY DO I NEED DATA PROTECTION SERVICES?

WHY DO I NEED DATA PROTECTION SERVICES? WHY DO I NEED DATA PROTECTION SERVICES? Data processing operations have evolved with breathtaking speed over the past few years, expanding from very large mainframe operations to small business networks.

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

How To Protect Research Data From Being Compromised

How To Protect Research Data From Being Compromised University of Northern Colorado Data Security Policy for Research Projects Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope... 1 4.0 Definitions, Roles, and Requirements... 1 5.0 Sources of Data...

More information

Facilities Maintenance Standards rev 9-1-2015

Facilities Maintenance Standards rev 9-1-2015 Facilities Maintenance Standards rev 9-1-2015 Purpose The purpose of these standards is to outline the minimum requirements for maintaining state owned facilities and infrastructures in a manner that will

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

The Commonwealth of Massachusetts

The Commonwealth of Massachusetts A. JOSEPH DeNUCCI AUDITOR The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 BOSTON, MASSACHUSETTS 02108 TEL. (617) 727-6200 No. 2008-1308-4T OFFICE OF THE STATE

More information

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint

More information

The terms hazard and risk are often used, which we define as the following:

The terms hazard and risk are often used, which we define as the following: Fire Safety Last updated in October 2010 This information sheet aims to give safety reps a basic understanding of fire safety and fire risk assessments under the current law. More detailed information

More information

Court Security Guidelines

Court Security Guidelines July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative

More information

FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS

FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS The attached self-inspection form is intended for staff use at regular, frequent intervals. It should not take the place of two other vital measures

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

How To Ensure Security At A Site Security Site

How To Ensure Security At A Site Security Site Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers

More information

TOOELE COUNTY EMPLOYEES EMERGENCY SAFETY HANDBOOK 2012 REVISION

TOOELE COUNTY EMPLOYEES EMERGENCY SAFETY HANDBOOK 2012 REVISION TOOELE COUNTY EMPLOYEES EMERGENCY SAFETY HANDBOOK 2012 REVISION This handbook has been developed for four reasons: 1) to save lives 2) to assist county officials in meeting OSHA requirements for fire safety

More information

FSIS Security Guidelines for Food Processors

FSIS Security Guidelines for Food Processors United States Department of Agriculture Food Safety and Inspection Service FSIS Security Guidelines for Food Processors Food Security Plan Management Dear Establishment Owner/Operator: The Food Safety

More information

Business Continuity Plan Template

Business Continuity Plan Template Business Continuity Plan Template Disclaimer This publication has been produced to provide a guide for people anticipating going into business and for business owners. It should not be regarded as an

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

HIPAA Security Series

HIPAA Security Series 7 Security Standards: Implementation for the Small Provider What is the Security Series? The security series of papers provides guidance from the Centers for Medicare & Medicaid Services (CMS) on the rule

More information

Emergency and Critical Incident Policy and Procedure

Emergency and Critical Incident Policy and Procedure Emergency and Critical Incident Policy and Procedure 1. Purpose and scope Emergencies and critical incidents in the workplace can affect people physically and psychologically, and affect the business continuity

More information

How To Protect The Time System From Being Hacked

How To Protect The Time System From Being Hacked WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY

SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY UNIT DESCRIPTOR This unit covers the competencies required to create and maintain a safe and secure hotel property both inside the property and the surrounding

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Physical Security for Companies that Maintain Social Infrastructure

Physical Security for Companies that Maintain Social Infrastructure 249 Hitachi Review Vol. 63 (2014), No. 5 Featured Articles Physical Security for Companies that Maintain Social Infrastructure Shinsuke Kanai Kenji Nakamoto Akio Takemoto Masatoshi Furuya OVERVIEW: While

More information

Emergency Management Guide for Business and Industry

Emergency Management Guide for Business and Industry Chapter 2: Disaster Preparation Emergency Management Guide for Business and Industry Preface This Guide gives a step-by-step approach to emergency planning, response and recovery for companies of all sizes.

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

Emergency Preparedness Plan Assessment

Emergency Preparedness Plan Assessment Emergency Preparedness Plan Assessment School Corporation: Completed by: School Representatives: School: Date: This assessment represents a one day review that may or may not be the total depiction of

More information

Contingency Plan. Facility Name

Contingency Plan. Facility Name Contingency Plan Facility Name This plan is reviewed annually and amended whenever changes occur that will significantly affect the ability of this facility to respond to an emergency situation. This includes

More information

Colorado High School Activities Association

Colorado High School Activities Association Colorado High School Activities Association Guidelines for Security, Safety, and Crisis Management Colorado High School Activities Association 14855 E. 2nd Avenue Aurora, CO 80011 (303) 344-5050 FAX (303)

More information

EMERGENCY PROCEDURES

EMERGENCY PROCEDURES EMERGENCY PROCEDURES In an Emergency Call 911 Using County Telephone System Call 9-911 Fresno County Sheriff 600-3111 Fresno County Security 600-6785 TABLE OF CONTENTS Introduction 3 Accidents 4 Serious

More information

WORKING IN CONFINED SPACES GUIDELINES

WORKING IN CONFINED SPACES GUIDELINES WORKING IN CONFINED SPACES GUIDELINES Contents 1 Introduction... 2 2 Scope... 2 3 Definitions... 2 4 Responsibilities... 3 4.1 Permit Authoriser... 3 4.2 Permit Receiver... 3 4.3 Responsible UOW Officer...

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Trucker) Please answer the following questions about your company s cargo security processes and participation

More information

Contingency Plan Template. Hazardous Materials and Waste Management Division (303) 692-3300

Contingency Plan Template. Hazardous Materials and Waste Management Division (303) 692-3300 Contingency Plan Template Hazardous Materials and Waste Management Division (303) 692-3300 October 2008 Contingency Plan A Large Quantity Generator of hazardous waste must have a written contingency plan

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0 MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Business Continuity Planning (BCP) / Disaster Recovery (DR)

Business Continuity Planning (BCP) / Disaster Recovery (DR) Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made

More information

Security Guidelines for. Agricultural distributors

Security Guidelines for. Agricultural distributors Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole

More information

Child Care Emergency Preparedness Training. Participant Manual

Child Care Emergency Preparedness Training. Participant Manual Child Care Emergency Preparedness Training Participant Manual Contents Introduction.... 5 Description.... 6 Goal.... 6 Objectives.... 6 Audience... 7 Prerequisite.... 7 Accompanying Materials...........................................................

More information

Emergency Management Guide for Business and Industry

Emergency Management Guide for Business and Industry Emergency Management Guide for Business and Industry A Step-by-Step Approach to Emergency Planning, Response and Recovery for Companies of All Sizes FEMA 141/October 1993 EMERGENCY MANAGEMENT GUIDE FOR

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

UFF Position Statement: Fire and Smoke as a Weapon

UFF Position Statement: Fire and Smoke as a Weapon UFF Position Statement: Fire and Smoke as a Weapon According to the United States Department of Homeland Security, international terrorist groups and violent extremists have shown interest in using fire

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information