Date:
… and entry, such as not carrying unnecessary or forbidden items; • Ensuring that staff phones are charged and numbers … where you would run to; • Be aware of the possibility of suspicious activity or items, and report them if you are … • Modules include how to identify security vulnerabilities, suspicious activity and how to respond to a weapons attack; …