… and entry, such as not carrying unnecessary or forbidden items; • Ensuring that staff phones are charged and numbers … where you would run to; • Be aware of the possibility of suspicious activity or items, and report them if you are … • Modules include how to identify security vulnerabilities, suspicious activity and how to respond to a weapons attack; …
… which staff should take if they identify a person acting suspiciously, discover a suspicious item, receive a bomb threat, are the recipient of malware, …
Keywords:
Risk Management
, Risk
, Incident Management
, Business Continuity
, Emergency Planning
, Venues and Public Spaces
… terrorism Current threat Identifying and responding to suspicious activity Identifying and dealing with suspicious items Bomb Threats Responding to a firearms or weapons …
Keywords:
Local Authorities
, Threat
, National Security
, Counter Terrorism Security Advisors
, CTSA
, Business Engagement
, ACT
, SCAN
, CTSAs