Displaying results 1 - 10 of 44
… Particular attention must be paid to the storage and delivery areas for ballot boxes, exits … of the premises to assist you conducting a search to identify anything out of place or suspicious. All staff … within the count venue will be controlled by colour-coded badges or wristbands (such as for count staff, media, …
… for speech recognition users Buttons on interactive videos within the e-Learning courses lack an accessible name Alternative audio descriptive tracks are not provided for video content Feedback and contact information If you need …
Keywords:
Accessibility
… such as the lead up to the New Year and national holidays. During this period we can see a significant increase … Review your Security and Business Continuity Plans Identify your risks, based on the current threat Increase … should have a visible presence, clearly display their ID badges and be briefed Review your Emergency Assembly Point …
… in London. During the ceremony, the King was crowned alongside Camilla, the Queen Consort. … our Coronation Toolkit for downloadable assets which was widely shared and displayed throughout the duration of the Bank Holiday weekend. Being aware of threats In the unlikely …
… Do not attempt to open the letter or package. Avoid unnecessary handling. Keep it separate so it is easily identifiable. … How to identify a suspicious package … Indicators of suspicious deliveries or mail When trying to identify a suspicious package, general indicators that …
Keywords:
Mail handling
, Suspicious Item
, CBR
, Threat analysis
, Chemical
, Physical Security
, Security
, Public Safety
, Suspicious activity
… should be required to report to reception or an individual in authority to notify their arrival. Visitors should … passes and have a legitimate reason for their visit. These identification passes should be worn and ‘be visible’ at all … not in public areas. Visitor best practice This process provides audit information, including sign-in/out times and the …
Keywords:
Site
, Security Culture
, Vehicle as a Weapon
, Access control
, Threat
, Site security
, Vehicle
, Security
, Goods vehicles
, Theft
, CCTV
, Drivers
, Hostile Vehicle Mitigation
, Visitors
, Contractors
… Asset How to use Download Download Welsh version Video – Inside Football Stadium Encouraging football fans to stay … if they see anything that doesn’t feel right. Portrait video can be used for Reels and Stories on Instagram and … media website. This is the same for hostiles. We have provided some suggested wording for the security section or …
Keywords:
Sports
, Public events
, Summer Vigilance
, Vigilance
, Vigilance messaging
, Venues and Public Spaces
, Venues
, Social media
, Media resources
, Staff
, Volunteers
, Vigilance campaign
, Summer Campaign
, Summer
, Digital assets
, Toolkit
, Social media
, Poster
, Communications
, Security minded communications
, Campaign materials
… Information and Intention Incident response and business continuity planning are … will respond prior to, and operate following, an incident and how it expects to return to ‘business as usual’ in … are in place with understanding of and adherence to Incident Response and Business Continuity Checklist . It need …
… Asset How to use Download Download in Welsh version Video – Pride Flag Encouraging everyone at Pride events to stay alert and tell security if they see … media website. This is the same for hostiles. We have provided some suggested wording for the security section or …
Keywords:
Venues and Public Spaces
, Venues
, Pride
, Pride event
, Event Security
, Summer
, Summer Campaign
, Digital assets
, Toolkit
, Social media
, Poster
, Communications
, campaign
, Security minded communications
, Campaign materials
, Summer Vigilance
, Vigilance campaign
… secure and resilient societies. NaCTSO will carefully consider the findings and insights from Coventry University as … in your questions. NaCTSO will draw on the insights provided in the report to refine their strategies and … Coventry University provide an evaluation on the Zones North East Pilot …
Keywords:
Counter Terrorism Support
, National Counter Terrorism Security Office
, Coventry University
, Institute for Peace and Security
, Protective Security
, Preparedness
, Secure societies
, Resilient societies
, Pilot program
, NaCTSO update
, North East Pilot
, NE Pilot
, Zones North East Pilot