SECURITY AWARENESS- EMERGENCY

EMERGENCY 

A serious, unexpected and often dangerous situation requiring immediate action. 

TYPES 

  • Work place Accidents
  • Medical emergency
  • Fire emergency
  • Bomb threat
  • Disaster

HEALTH
simply it is absence of Disease or ill health

SAFETY
absence of uncontrolled Hazards & Risks of serious personal injury or equipment damage


WELFARE
Looking after people’s basic needs by providing basic facilities such as: toilets, hand wash station, rest rooms

DANGEROUS OCCURRENCE
It is an unwanted & unplanned event which has the VERY HIGH potential to Result in SEVERE loss or harm of any kind such as injury to person, damage to equipment BUT IT DID NOT RESULT OF ANY LOSS AT ALL


HAZARD
HAZARD A hazard is something that can cause harm

Example:
  • Electricity
  • Chemicals
  • Knife
  • Working up a ladder
  • Noise
RISK
A risk is the chance, high or low, that any hazard will actually cause somebody harm.

Example:
  • Working alone away from your office can be a hazard. The risk of personal danger may be high.
  • Cut injury from knife.

 

DISASTER/CALAMITY 
A sudden occurrence of an accident that cause huge loss of life and property is called as a disaster or calamity. 
TYPES
  • Natural disaster - Earthquake, cyclone, flood
  • Manmade disaster - Wars, fire accidents, exposition, industrial accidents
CRISIS 
A time of intense difficulty or danger. 
 
TYPES
  • Natural disasters – floods, earthquakes
  • Technological Crisis
  • Malware, Spyware or Data Leaks
  • Confrontation Crisis
  • Personnel Crisis
  • Financial Crisis
  • Reputation Crisis
  • Organizational Crisis
ACCIDENT
An accident is defined as an unplanned event that result in personal injury or property damage.


INCIDENT/Near Miss
An incident is defined as an unplanned event that does not result in personal injury but may result in property damage


UNSAFE ACT
Unsafe activities are the action of the person which is possible or certainly leads to accidents or increase the risk of accidents.

UNSAFE CONDITION
Any condition or situation which increase the risk & danger of accidents can be called as unsafe condition.

EMERGENCY COLOUR CODE

1

WHITE

Violent situations/ fight

2

BLACK

Bomb threat/ suspicious object

3

RED

Fire / smoke

4

GREEN

Evacuation

5

BLUE

Medical Emergency

6

YELLOW

Missing adult

7

PINK

Child theft

8

BROWN

Hazardous material spill

9

SILVER

Active shooter

10

ORANGE

External disaster

11

GREY

Infrastructure loss

12

PURPLE

Hostage situation



RISK ASSESSMENT

A risk assessment is a process used to identify potential hazards and analyze what could happen if a disaster or hazard occurs

KEY STEPS IN RISK ASSESSMENT:

1.Identify Hazards: Determine the potential sources of harm or damage. identify the people who might be harmed & how?

2.Assess Risks: Analyze the likelihood and potential consequences of each hazard.

3.Control Risks: Implement measures to eliminate or reduce the identified risks.

4.Record Findings: Document the assessment process, including hazards, risks, and control measures.

5.Review and Update: Periodically review and update the assessment to ensure its continued relevance and effectiveness. 

 

BENEFITS OF RISK ASSESSMENT:

·Reduced Risk: By identifying and addressing potential hazards, risk assessment helps to prevent accidents, incidents, and other adverse events.

·Improved Efficiency: Understanding risks allows for better resource allocation and prioritization of safety measures.

·Cost Savings: By preventing damage and injuries, risk assessment can help reduce costs associated with incidents, lawsuits, and lost productivity.

·Compliance: Risk assessment can help organizations meet legal and regulatory requirements related to safety and health.

·Enhanced Reputation: A strong risk assessment program can demonstrate a commitment to safety and build trust with stakeholders. 



SEVERE WEATHER AND NATURAL DISASTERS

Tornado:

·        When a warning is issued by sirens or other means, seek inside shelter. Consider the following:

v Small interior rooms on the lowest floor and without windows,

v Hallways on the lowest floor away from doors and windows, and

v Rooms constructed with reinforced concrete, brick, or block with no windows.

·        Stay away from outside walls and windows.

·        Use arms to protect head and neck.

·        Remain sheltered until the tornado threat is announced to be over

 

Earthquake:

·        Stay calm and await instructions from the Emergency Coordinator or the designated official.

·        Keep away from overhead fixtures, windows, filing cabinets, and electrical power.

·        Assist people with disabilities in finding a safe place.

·        Evacuate as instructed by the Emergency Coordinator and/or the designated official.

Flood:

If indoors:

·        Be ready to evacuate as directed by the Emergency Coordinator and/or the designated official.

·        Follow the recommended primary or secondary evacuation routes.

If outdoors:

·        Climb to high ground and stay there.

·        Avoid walking or driving through flood water.

·        If car stalls, abandon it immediately and climb to a higher ground.

DISASTER MANAGEMENT

disaster is a sudden occurrence of an accident that cause huge loss of life and property.

Disaster management is a comprehensive process encompassing planning, organizing, and coordinating efforts to prevent, mitigate, prepare for, respond to, and recover from disasters.

It involves a continuous cycle of actions to minimize the impact of both natural and human-made disasters. This includes proactive measures like early warning systems and building codes, as well as reactive efforts during and after an event.

The Disaster Management Cycle:

1.Prevention: Proactive measures to reduce the likelihood of a disaster.

2.Mitigation: Actions to minimize the impact of a disaster if it does occur.

3.Preparedness: Developing plans and training personnel to respond to emergencies.

4.Response: Providing immediate assistance during and after a disaster.

5.Recovery: Supporting communities in rebuilding and restoring their lives after a disaster.

Organizations Involved in Disaster Management:

·National Disaster Management Authority (NDMA): The apex body in India responsible for laying down policies and guidelines for disaster management.

·State Disaster Management Authorities (SDMAs): State-level bodies responsible for implementing disaster management plans.

·District Disaster Management Authorities (DDMAs): District-level bodies responsible for coordinating disaster response efforts.

·Local communities and NGOs: Play a crucial role in disaster preparedness, response, and recovery.

Examples of Disaster Types:

Disasters can be natural, such as earthquakes, cyclone, floods, hurricanes, or human-made, such as industrial accidents, terrorist attacks, or pandemics, wars, fire accidents,


SOME COMMON AND WIDELY USED MANAGEMENT SYSTEM STANDARDS ARE:

•        ISO 45001 (Occupational Health and Safety Management System)

•        ISO 14001 (Environmental Management System)

•        ISO 9001 (Quality Management System)

•        ISO 50001 (Energy Management System)



National Regulations

The National Building Code of India (NBC) sets fire safety provisions for residential, commercial, and industrial buildings. The Fire Services Act empowers state governments to enforce fire safety laws.

 

TOP IMPORTANT LAWS RELATED TO HSE

·        The factories act, 1948

·        The building & other construction workers act, 1996 & rule 1998

·        The child & adolescent labor (prohibition & regulation) act, 1986

·        The contract labor (regulation & abolition) act ,1970

·        The employee’s compensation act, 1923 (amendment 2017)

·        The gas cylinders rules 2016 (amendment 2018)

·        The central motor vehicles rules, 1989 (amendment 2018)

·        The electricity act, 2003 (amendment 2007)

·        The air (prevention & control of pollution) act, 1981 (amendment 2018)

·        The water (prevention & control of pollution) act, 1974 (amendment 2014)

·        The environment protection act, 1986

 

WORKPLACE HAZARDS AND RISK CONTROL.

·        Health, welfare & environment requirements

·        drinking water

·        toilet facilities

·        washing facilities

·        changing room

·        accommodation for clothing such as lockers or other storage facilities

      ·       resting and eating facilities

 

 

 

NEBOSH - National Examination Board in Occupational Safety and Health

OSHA - Occupational Safety and Health Administration

IOSH - The Institution of Occupational Safety and Health

NEBOSH IGC - National Examination Board in Occupational Safety and Health International General Certificate

ASIS - American Society for Industrial Security

CPP - Certified Protection Professional

PCI - Professional Certified Investigator

APP - Associate Protection Professional

PMP - Project Management Professional



Investigate potential security threats 

  • Gather as much information as possible about the threat. This can include collecting data from security cameras, speaking to witness and reviewing any relevant documentation.
  • Try to identify any patterns associated with the threat.
  • Work with other departments within the organization such as IT & HR, to gather additional information about the threat.
  • Use all available resources to investigate the threat, including hiring outside consultants or bringing in law enforcement if necessary.
  • Keep detailed records of all aspects of the investigation, as this can be helpful in case there are future incidents or legal proceedings.

THEFT CONTROL
  • Positioning security personnel
  • By using surveillance system
  • Access control measures
  • Employee training
  • Behavioral analysis
  • Loss prevention technologies like RFID tags, EAS System

RFID – RADIO FREQUENCY IDENTIFICATION 
These are small electronic devices that store information and communicate with other devices using radio waves. RFID tags are used in a variety of applications from tracking inventory to monitoring the movements of livestock

 

ALARM 4 TYPES

 

Life safety

  • Fire alarm
  • Building lockdown
  • Security assistance requested
  • Duress
 
 Intrusion
  • Crawl over
  • Door forced open
  • Glass break
  • Motion detector
  • Emergency exit door
  • Tailgate
  • Suspended/ terminated badge
  • Door held open
 
 Space management
  • Anti-pass back
  • Invalid badge
  • Power failure
  • Cabinet tamper
  • Temperature
 system health
  • Communication lost
  • Data base error 
  • Foreign voltage
  • Grounded loop/ fault
  • line error
  • non- setting voltage
  • open line
  • panel event/memory/option mismatch
  • reader offline
  • shorted line
  • video server is not recording

 

 

 

PHYSICAL SECURITY LAYERS
Perimeter Security 
This is the first line of defense. It involves safeguarding the boundary of a facility, often with fences, walls, barriers, and gates. It's complemented by security lighting, surveillance cameras, and patrol guards


Exterior Security 
After the perimeter, the next layer focuses on the external features of a facility. This includes windows, doors, and open spaces like parking lots. Adequate lighting, surveillance cameras, and sensor-triggered alarms play a role here.

Interior Security 
This targets the inside of the facility. Measures include door access control systems, internal CCTV monitoring, motion detectors, and protected zones or safes for highly valuable assets.


Email communication

To: 
This field is for the main recipients of the email. When you send an email, you typically put the primary recipient(s) in this field.

CC: 
When you use the CC field, you are sending a copy of the email to someone who needs to be aware of the message but may not need to take any action. All recipients in the "To" and "CC" fields can see who else received a copy.

BCC: 
The BCC field allows you to send a copy of the email to someone without the other recipients knowing. This is useful when you want to keep the recipient's identity private or when sending to a large group where you don't want everyone's email address visible.

Previous Post Next Post