Date:
… essential part of keeping the UK safe from terrorism. Our Action Counters Terrorism (ACT) suite of products, including our award-winning ACT e-Learning, provide the public with the knowledge they …
… can take to make their event safer for all and a less attractive target to terrorists. The full Purple Guide is … have an obligation under the Health and Safety at Work etc Act 1974 to provide a safe place for their employees to work and for the visitors to their attractions and events. Consideration of the risk posed by …
… having trouble accessing them, please don’t hesitate to contact us via our contact form . …  Digital Assets Description View and download Action Counters Terrorism Awareness e-Learning A5 Size …
… length body established by the Private Security Industry Act 2001 as the regulator of the private security industry. … who perform certain security roles specified in the Act (e.g. door supervisors and security guards). This … proper’ to hold a licence. Administering the Approved Contractor Scheme (ACS), a voluntary quality assurance scheme for …
… Communicating protective security measures can act as a free and highly effective layer of security, but … members of the public are inclined to report suspicious activity to transport staff and nearby businesses, not just … turn, this enables you to maintain a good awareness of the activities in and around your premises and manage them …
… within or near their premises, which may inadvertently impact staff safety, public safety or disrupt normal … response Incident response deals with the immediate impact of an incident. It is a relatively short-term phase that focuses on escalation and activation, making sure people and the environment are …
… defeat terrorism by reporting any suspicious behaviour or activity. By having more eyes and ears available, we can … and report it. For more information on how to report, go to Action Counters Terrorism (ACT): Report suspicious activity.  For advice and guidance …
… plans that include how the threat information is recorded, acted upon and passed to police. Evaluating the credibility … if the attack being threatened is imminent. This is a tactic used to place additional pressure on decision makers. … or where the threat is assessed as not credible limit your actions to informing the police and searching the venue for …
… be secured to prevent any unauthorised entry. All staff acting in an official capacity should have access to this … and for what reason. Be prepared to challenge suspicious activity.  Wherever possible, obtain the details of those … should be given prior notification. Compile a list of contact numbers for those normally responsible for the premises …