Emergency/Security Planning Webinar

Post on 14-Jul-2016

6 views 0 download

description

By the National Network for Arab American Communities

Transcript of Emergency/Security Planning Webinar

National Network for Arab American Communities

Executive Critical Incident Preparedness Briefing

March 16, 2016

Sanford Altschul

Why Emergency Preparedness Planning?

• Quick and effective action is required during the onset of an emergency.

• Effective action often depends on having plans in place before the disaster strikes.

• If response is delayed, staff, clients, visitors lives maybe needlessly lost.

Emergency Planning• Risks/Hazards• Assessment• Planning• Likely Scenario• Resources

Internal capacity

Risks & Vulnerabilities

External preparedness

Strategic Interventions

Preparedness actions

Risks/Vulnerabilities

Vulnerability The propensity (susceptibility or tendency) of people and things to be damaged by a hazard. A person or group’s vulnerability depends on their capacity to anticipate, cope with, resist and recover from the impact of a hazard.

RiskThe likelihood of a disaster happening to a particular group of people.

Risks/Vulnerabilities

Assessment – What Are Your Risks?

• Severe Weather• Power Outage• Hazardous Materials (Facility, Transportation)• Other Natural Disasters (Earthquake, flooding)• Civil Unrest• Bomb Threats• Violent Intruder

Assessment – Conduct One

• Survey the area• Identify Safe Areas• Identify Evacuation Routes and Assembly

Areas• Look to local resources – Police, Fire,

Emergency Management, DHS• On-Line Tools

Preparedness

Preparedness - Implementation

• Share the plan with employees, stakeholders• Install/Upgrade Security Systems• Develop Policies• Train (Tabletop Exercises, meetings, etc.)• Participate in Community Emergency

Preparedness Activities (Exercises, Seminars, Workshops)

• Link to local Law Enforcement Intelligence Sharing System (e.g. Fusion Center)

The Plan

• Plans take many different formats, has to work for the organization, if not, won’t be used.

• To include:– Assessment (or reference to findings)– Key Resource contact information, including local city

and/or county departments– Key employee and management contact information– Emergency procedures– Some aspects of security procedures (some may be

sensitive/restricted

The Plan (cont.)

• Locations of identified –– Shelter areas– Evacuation routes– Evacuation Assembly Areas– Location of emergency supplies/equipment

• Introduction, Purpose, Objectives, Scope, etc.• Site Maps

Bomb Threat

Bomb Threat5-step process for effectively dealing with bomb threats: 

1. Receiving the call and notifying the Control Point.2. Evaluation of the call by the Control Point, and determining which of the following steps is required:

• A search• No search• An evacuation

3. A search of the premises.4. If necessary, evacuation of the premises in an orderly manner.5. All clear.

Violent Intruder/Active Shooter

• We can not predict the origin of the next threat• Assailants in recent incidents across the country

were not students or employees.• Victims are often unaware they were targets, until

attacked **• Very few of the attackers ever directed threats to their

targets before the attack.

Mitigation

• Protective Measures:• Early Warning / Notification System• Surveillance System • Organization training involvement• Building construction• Established escape routes • Identification / location of safe rooms• SEE SOMETHING – SAY SOMETHING

Responding to an Violent Intruder

• RUNRUN• HIDEHIDE

• FIGHTFIGHTCALL 9-1-1CALL 9-1-1

RUN

• Always Be Aware• Know Escape Routes

– Exits/Windows• Move quickly; don’t wait for others to validate

your decision• Leave belongings behind

• Survival chances increase if you are not where shooter is or to go where he can’t see you

HIDE

• If you can’t get out, secure the immediate area “hide out” – whether office, bathroom, storeroom, classroom

• If you find yourself in an open area, immediately seek protection

- Block/barricade the door using whatever is available – desks, file cabinets, books, other furniture

- If the shooter enters your room and leaves, lock/barricade the door behind him

- If safe allow others to seek refuge with you - If two or more of you, DO NOT huddle together

HIDE (cont.)

DOORS, WINDOWS, OPENINGS, and NOISE

- Close blinds - Turn off electronics (TV, radio, etc) - Dim or face computer monitors away from windows or doors - Silence cell phones (put on vibrate) - Place signs in exterior windows to identify the location of injured persons - Keep occupants calm and quiet - After securing the room. People should be positioned out of sight and behind items that might offer additional protection – walls, desks, file cabinets, etc. - Stay low- reduce your profile

FIGHT

• If no other choice!!!

– Attempt to incapacitate and disrupt the intruder

– Act with physical aggression and throw items at the intruder

– Getting shot does not mean that you are dead

•You can and must keep going!

Resources

• Local Emergency Management Office• State Emergency Management Office• Local Inter-Faith Coalition• National Inter-Faith Coalitions

Resources

• Ready.gov• Faith Based Community of Practice,Community.fema.gov• Fema.gov

IS-907 - Active Shooter: What You Can Do http://training.fema.gov/EMIWeb/IS/IS907.asp

IS-906 – Workplace Security Awareness• Dhs.gov/activeshooter

Resources

Questions?

Thank you for attending

About ARK

• ARK-CIM is a recognized leader in Emergency Preparedness, Critical Incident Management, Critical Incident planning and response, Business Continuity Management. With more than 30 years experience assisting organizations in preparing for, responding to and recovering from critical incidents. Clients, including recognized brands throughout North America, recognize us for our commitment to Protect Their Assets: People-Reputation-Products-Community-Infrastructure. Contact us at: (734) 612-7204 or visit us on the web at: ark-cim.com