Q: For those institutions that have BIT's, who is using a graded threat assessment model & who is using a more fluid scale?
Contains documents related to the following categories: Active Shooter, Bomb Threat Incident Management, Celebratory Events, Critical Incident Management, Emergency Notification and Operations Plans, Evacuation Plans and Procedures, Fire Safety, Major Event and First Amendment Protected Event Planning, Musicians/Speakers on Campus, Public Health/Pandemic Influenza, Terrorism/Violent Extremists and Threat Assessments
NOTE: The advice and tips presented here can apply to you and your family, as well as your business. As a a university employee, a small business owner or just a member of an average family we rarely think of ourselves as “targets” and yet frankly we are, especially if you are on a campus...
Tabletop exercises should be realistic and tailored to your campus. A threat or vulnerability assessment examines threats in terms of probability, likelihood, and magnitude of impact. Once threats are identified, every attempt should be made to mitigate the potential impacts. Mitigation measures can include establishing procedures that would decrease the identified risk and/or recovery time. By completing a threat assessment and risk mitigation, companies can potentially limit their losses in the event of an incident. Exercising with site-specific and applicable emergency scenarios allows responders to effectively combat threats and efficiently respond to specific emergencies
It is always a good idea however to do a front-end risk/threat assessment to determine how such a proposal/campaign can turn into am issue and ultimately a crisis
We recommend that a current threat assessment and crisis audit be conducted every six months your organization...· Have we been diligent in our continued assessment of actual and potential consequences of the crisis?
Using checklists during a bomb threat is prudent and a best practice. Organizations should remember to train all personnel who may take a bomb threat or be in a position to see suspicious packages
Mind-mapping crisis messages – The Situation Assessment - Article 3 in a series This is a series of articles that will help you understand the seven stages of a crisis and how to mind-map crisis messages
Within the crisis audit, six major areas are assessed: Compliance Preparedness Training Information management Quality assurance Communications Crisis Audit, Assessment, Review and Plan Development This audit then leads to a series of steps that leads the organization through a thorough self-inspection with the input from an objective third-party observer to enhance and improve existing plans and then to develop a comprehensive plan of action that provides pre, during and post operational plans . This is accomplished by a phased process consisting of five distinct phases: Phase One – Information gathering and reporting Collecting data and information from people in key positions; Conducting confidential interviews with management, staff and stakeholders; Finding and assessing operational and communication strengths, weaknesses, opportunities and threats and; Reporting the results to the key decision makers on the management team, reaching consensus on the key areas in which planning is required or where planning needs renovation and securing recommendations for the candidates for a well-versed and representative planning team
When contemplating and planning for table-top exercises a comprehensive situational assessment review is essential