Security Threats Intentional malevolent threats Angered owners Animal rights activists Unauthorized media Vandalism or theft Unintentional threats Inadvertent intruders Curious visitors Selfdeployed volunteers ID: 634699
Download Presentation The PPT/PDF document "Health and Safety Responder Security" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Health and Safety
Responder SecuritySlide2
Security Threats
Intentional malevolent threats
Angered owners
Animal rights activistsUnauthorized mediaVandalism or theftUnintentional threatsInadvertent intrudersCurious visitors“Self-deployed” volunteersAggressive dogs
Just In Time Training
Responder SecuritySlide3
Site and Personal Security
Control access to the work site
Limit unauthorized access
Prevent interference with responseAccount for personnelLimit risk of disease, hazards or injuryJust In Time Training
Responder SecuritySlide4
Security Officer
Works with Operations Section Chief
Assess any security threats
Determine control measuresEstablish personnel identification systemEstablish communication systemImplement use of temporary fencingJust In Time Training
Responder SecuritySlide5
Site Control Plan
Site map and boundaries
Site work zones
Site communicationSafe work practicesUse of “buddy system”Personal protective equipmentMedical assistance instructions
Just In Time Training
Responder SecuritySlide6
Site Security
Control entry/exit
Limit unauthorized access
Establish site boundariesPost signs at perimeterLightingLog book for allowed personnelDesignated security personnelLaw enforcement
Just In Time Training
Responder SecuritySlide7
Work Zones
Work zones
Control access and movement in area
Deters unauthorized personnelReduce risk of spread of diseaseEstablishment of work zonesPersonnel are properly protected Work activities confined to certain areasPersonnel can be located quickly
Just In Time Training
Responder SecuritySlide8
Biosecurity Work Zones
Just In Time Training
Responder SecuritySlide9
Responder Responsibility
Follow established security measures
Explained at initial briefing
Communication Established methodsCell phone, radioBe aware of surroundingsUnauthorized or suspicious personsIf noticed, contact your supervisor
Monitor the individual until assisted
Just In Time Training
Responder SecuritySlide10
Buddy System
Accountability
Accounted for at ALL times
Site investigations, response control zoneEnter/exit through designated pointsWork in pairsStay in close visual contactAssist partner as needed
Observe for signs of distressFind emergency assistance if needed
Just In Time Training
Responder SecuritySlide11
Non-Cooperative or
Threatening Persons
Guidelines
Travel in teams or with buddyCarry cell phone at all timesRemain calm; avoid confrontationLeave if safety concerns exist
Call supervisor, team leader or policeDocument and report the incident
Situations can escalate quicklyInterference is violation of US Code
Just In Time Training
Responder SecuritySlide12
Aggressive Dogs
Be aware of surroundings
Listen for barking and observe when entering
Do not enter whenUnrestrained dogs Barking, but no dog seen
Just In Time Training
Responder SecuritySlide13
Aggressive Dogs
When confronted by dog:
Do not stare into eyes or run
Stop, slowly back away, place barrierIf you fall, curl into ball with hands over head/neckGet treatment and report if bittenJust In Time Training
Responder SecuritySlide14
Resources
USDA Foreign Animal Disease Preparedness (FAD
PReP
) Guidelines: Health and Safetyhttp://www.aphis.usda.gov/animal_health/emrs/nahems.shtmlUSDA Health and Safety Planhttp://www.aphis.usda.gov/emergency_response/hasp/health_safety_hs_training.shtml
Just In Time Training
Responder SecuritySlide15
Acknowledgments
Development of this presentation was by the Center for Food Security and Public Health at Iowa State University through funding from the Multi-State Partnership for Security in Agriculture
Authors: Dan Taylor,
DVM, MPH
; Glenda Dvorak, DVM, MPH, DACVPM