Safety and Security Begin S at the front deSk · Safety and Security Begin S at the front ... 5.cus...

12
SAFETY AND SECURITY BEGINS AT THE FRONT DESK 800-556-3009 www.careertrack.com Be prepared to handle emergencies, threats, and unexpected situations DISCLAIMER: The principles and suggestions in this handout and the SAFETY AND SECURITY BEGINS AT THE FRONT DESK: BE PREPARED TO HANDLE EMERGENCIES, THREATS, AND UNEXPECTED SITUATIONS webinar are presented to apply to diverse personal and company situations. These materials and the overall seminar are for general informational and educational purposes only. The materials and the seminar, in general, are presented with the understanding that CareerTrack is not engaged in rendering legal advice. You should always consult an attorney with any legal issues. ©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc. AFD1310

Transcript of Safety and Security Begin S at the front deSk · Safety and Security Begin S at the front ... 5.cus...

Safety and Security BeginS at the front deSk

800-556-3009www.careertrack.com

Be prepared to handle emergencies, threats, and unexpected situations

DISCLAIMER: The principles and suggestions in this handout and the SAFETY AND SECURITY BEGINS AT THE FRONT DESK: BE PREPARED TO HANDLE EMERGENCIES, THREATS, AND UNEXPECTED SITUATIONS webinar are presented to apply to diverse personal and company situations. These materials and the overall seminar are for general informational and educational purposes only. The materials and the seminar, in general, are presented with the understanding that CareerTrack is not engaged in rendering legal advice. You should always consult an attorney with any legal issues.

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc. AFD1310

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

2

Problem definition the organization’s role

occupational Safety and health act, Section 5(a)(1), the general duty clause

Each employer shall furnish to each of his employees employment and a place of employment whichare free from recognized hazards that are causing or are likely to cause death or serious physical harmto his employees.

Workers’ compensation

Exclusive Remedy Rule

Suits Outside of the Workers’ Compensation System

your rolehow do you see yourself in the context of contemporary business? What role(s) do you play?

Greeter

Gatekeeper

Traffic director

Security monitor

Alarm sounder

ModuLe one

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

3

conflicting considerations risk avoidance

Crime Prevention Through Environmental Design (CPTED)

risk reduction

risk spreading

risk transfer

risk acceptance

Possible maximum loss

Probable maximum loss

challenges

deterrence

detection

defense

defeat

ModuLe tWo

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

4

Problem analysis assess the Warning Signs of trouble that Will Put you in red-alert Mode

Type of “crime”

Attack methods

Season, day, time of attack

Suspect characteristics

Typical types and amounts of loss or injuries suffered

identify and eliminate Security gaps in your front desk area

1. issue identification

Type of Emergency

Probability

High Low5 1 x

Human Impact

High Low 5 1 x

Property Impact

High Low 5 1 x

Business Impact

High Low 5 1

Total

Issue x

Issue a

Issue z

Issue b

Issue m

Issue y

2. assign Values

Type of Emergency

Probability

High Low5 1 x

Human Impact

High Low 5 1 x

Property Impact

High Low 5 1 x

Business Impact

High Low 5 1

Total

Issue x

Issue a

Issue z

Issue b

Issue m

Issue y

ModuLe three

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

5

ModuLe three identify and eliminate Security gaps in your front desk area

3. Multiply the factors one against the other

Type of Emergency

Probability

High Low5 1 x

Human Impact

High Low 5 1 x

Property Impact

High Low 5 1 x

Business Impact

High Low 5 1

Total

Issue b

Issue x

Issue y

Issue z

Issue a

Issue m

4. Sort total Value in descending order

5. focus on threats With the highest numeric Value

Security risk management formula

Likelihood of threat occurrence

x Severity of potential damage ---------------------------------------------------------------

Possibility of harm

Financial considerations

Type of Incident

Probability Possible Maximum Loss

Probable Maximum Loss

Cost to Reduce Probability

Implement?

High Med Low Yes No

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

6

Visitors evaluate your Visitor access Procedures to Be Sure your gatekeeping techniques are on target

access entitlements

enrollment procedures

Time zones

Access levels

Geographic controls

Jan- Mar

Apr- Jun

July- Sep

Oct- Dec

Mon Tues Wed Thur Fri Sat Sun 6 am- 6 pm

24/7 Zone 1

Zone 2

Zone 3

Charlene Simon Ian Betsy Maya Noah

ModuLe four

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

7

Visitors evaluate your Visitor access Procedures to Be Sure your gatekeeping techniques are on target

designated restricted areas

A restricted area is any area that is subject to special restrictions or controls for security reasons. Restricted areas may be established for the following:

Level 3 (lowest): The enforcement of security measures and the exclusion of unauthorized personnel.

Level 2: Intensified controls in areas requiring special protection.

Level 1 (highest): The protection of classified information or critical equipment or materials.

four commonly used access-control id methods are:

Personal-recognition system

Single-card or -badge system

Card- or badge-exchange system

Multiple-card or -badge system

ModuLe four

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

8

Visitors evaluate your Visitor access Procedures to Be Sure your gatekeeping techniques are on target

Visitor identification and control

Unrestricted access

Sign-in, no follow-up

Sign-in with follow-up if visitor does not sign out

Sign-in with badge but no follow-up if badge not returned

Sign-in with badge and follow-up if numbered badge not returned

Sign-in with badge and escort

Sign-in with color coded badge depicting geographic restrictions

Time-based key card or other credential, e.g., card turns black after a certain length of time

Suggestion: develop, at a minimum, two different levels of security–normal and high

The normal level will represent regular security procedures.

The high level will detail how increased vigilance and heightened security operations will beimplemented.

ModuLe four

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

9

Special challenges Suspicious Letters and Packages

Posters

FBI Poster - http://www.adl.org/security/fbi.pdf USPS Poster - http://about.usps.com/posters/pos84.pdf

checklists

if a suspected bomb: Do not open–lay it down gently and keep it level. Isolate it and clear out the area within a 200-foot radius. Do not put it in water. Do not put or lock it in a cabinet or drawer. If you have windows, open them. Call 9-1-1.

if a suspected bio-chemical agent and it is unopened: Above steps except do not open windows. Do not attempt to open article. Place it in a clear bag and seal it. Record the return address, addressee and postal information found on the article. Isolate article so it won’t be handled again. Ensure those who had contact with it wash their hands with soap and water for at least three

minutes and rinse for at least one minute. Shut off ventilation system to the area where the suspicious mailing is. Shut off the photocopying machine and other equipment containing fans in the area where the

suspicious mailing is. Contact the sender and addressee to determine contents. If unsuccessful and the article still seems suspicious, evacuate the area and contact the police.

ModuLe fiVe

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

10

Bomb threats Bomb threat checklist

Exact time of call: _______________

Exact first words of the caller: _________________________________________________________________________________________________________________________________________________________

• Remaincalm,becourteous,listento,anddonotinterruptthecaller.

• Getattentionofanotherperson-givenotesaying"Call9-1-1,bombthreat."

• IfyourphonehascallerIDdisplay,recordnumberofincomingcall. _______________________________

• Writedownexactwordsofthecallerandthreat.

• Don'thangupthephone.Leavelineopen.

• Notifyasupervisor.

try to keep the caller on the phone and talking by asking the following questions:

1. When will it explode? At what time? ________________________________________________________

2. Where is it located? What floor? Room? ______________________________________________________

3. What does it look like? ___________________________________________________________________

4. What kind of bomb is it? ___________________________________________________________________

5. What will set it off? ______________________________________________________________________

6. Why are you doing this? __________________________________________________________________

7. Who are you? ___________________________________________________________________________

8. Are you aware that it could kill or injure innocent people in addition to those you intend to hurt?______________________________________________________________________________________

ModuLe fiVe

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

11

NameofPerson Receiving Call: ____________________________________

PhoneNumberThreatWasReceivedon:____________________________________

Voice Speech Language Behavior Background Noises

Clean Accented Educated Agitated Airport

Distorted Deliberate Foreign Angry Animals

Loud Distinct Foul Blaming Baby

Muffled Fast Intelligent Calm Birds

Nasal Hesitant Irrational Fearful General Noise

Pitch-High Lisp Rational Laughing Guns Firing

Pitch-Med Slow Slang Nervous Gymnasium

Pitch-Low Slurred Uneducated Righteous Machinery

Pleasant Stuttered Unintelligible Other: Music

Raspy If Accented, If Foreign, Party

Smooth Describe: Describe: Quiet

Soft Restaurant

Squeaky Talking

Unclear Tavern / Bar

Other: Television

Traffic

Train

Typing

Water / Wind

Other:

Bomb threats Bomb threat checklist

description of caller (check all that apply)

Sex: Male ______ Female ______ Unknown ______ Approximate Age ______

ModuLe fiVe

©2013 CareerTrack, a division of PARK University Enterprises, Inc. Registered U.S. Patent & Trademark Office and Canadian Trade-Marks office. Except for the inclusion of brief quotations in a review, no part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from PARK University Enterprises, Inc.

12

develop an emergency action PlanPlan contents

Emergency information sheet (one-page summary of immediate steps to be taken and individuals tobe contacted)

Introduction to the plan

Communicationplan(or"telephonetree")

Prevention/protection strategy

Checklist of pre-disaster actions (outline of procedures to be followed in advance of emergency forwhich there is advance warning [e.g., hurricane, flooding], including assignment of responsibilities forthose actions)

Instructions for response and recovery

Emergency action

Notification

Disaster declaration

Systems recovery

Networkrecovery

User recovery

Salvage operation

Relocation

Detailed appendices

engage in table top exercises A sit-down, planning exercise to run through the actions and procedures that need to be taken and for

working out solutions to problems that are likely to arise based on a given emergency situationor scenario.

During the exercise, management will be solving perceived or anticipated problems in a given situationor scenario without the participation of the building occupants.

The emphasis in this type of exercise is on the adoption of corrective solutions and procedures.

ModuLe fiVe