secretaries’ in-service officer cindy paz cpaz1@bisd.us brownsville isd police & security...

Post on 29-Dec-2015

221 Views

Category:

Documents

4 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Secretaries’ In-Service

Officer Cindy Paz

cpaz1@bisd.us

Brownsville ISD Police & Security Department

Visitor Management Procedures

• Ask for a valid Identification for all visitors• Conduct sex offender check on all visitors

who will access student populated areas• Keep visitor passes in a safe location out of

reach• Apply the 90/10 rule• Escort visitors at all times

Purpose

• To help you recognize situations that impact potential verbal and physical abuse by a student or visitor toward staff.

• To provide tools to help you de-escalate a volatile situation.

Your safety and welfare are important to us.

Defusing a SituationBe aware of the anxiety level

• Note when situation first escalates.• Louder voice• Fidgeting, verbal sounds• Build up of energy

• Be Proactive not Reactive. Attend before things get out of hand.

• The staff needs to be in control by actively defusing the student or visitor.

Defusing Techniques

• Avoid arguing or defending previous actions.

• Avoid threatening body language (don’t stand with arms crossed).

• Calmly but firmly outline limits of the setting.

Defusing a SituationWatch for the Defense Phase

• If situation continues to escalate, student or visitor will give more physical cues (louder, more agitated verbalizations, etc).

• Staff needs to intervene to defuse. – Reduce stimulation from setting…eg. bring to an office. – Communicate information about any delays etc.– Give some choices.

• As emotions increase, auditory processing abilities decrease.

Defusing Techniques

• Give an upset student or visitor plenty of personal space.

• Allow a frustrated person some time to vent.

• Ignore personal verbal “attacks”.

Violence Reduction Strategies

• Limit stimulation and traffic in location.

• If there is a trusted person that can be identified, consider suggesting that the person be present to help calm the individual.

Tips: Dealing with Agitated Persons

• Isolate the person who is agitated if possible.

• Position yourself betweenthe person and the exit. (Safely)

• Call for help.

• Offer simple statements.

Acting Out Level Visitor looses control

• Staff need to remain professional and in control.

• It is not personal.

• Use calm voice…simple statements. The visitor can’t process as well as normal.

• Help visitor get in control. “I want to hear what you have to say but I can’t do it when you are screaming”.

• Call for assistance

Emergency Response Procedures

• Lockdown-3 drills per school year• Soft Lockdown-1 drill per school year• Shelter in Place-1 drill per school year• Evacuation-Monthly Fire Drill • Severe Weather Drop Cover and Hold-1 drill

per school year

ANNOUNCE USING PLAIN ENGLISH!

No screening is 100% effective.

That’s why we developed this program to help you recognize a potentially harmful mail piece and instruct you what to do if you get suspicious mail.

General guidelines

• Do not eat or drink while handling the mail.

• If you have open cuts or skin lesions on your hands, wear disposable vinyl gloves.

• Upon completion of your postal task wash your hands with anti-bacterial soap and warm water.

Main threats

Bomb Anthrax

What mail is suspicious?

Anything out of pattern!

• If you have received a piece of mail which looks different from what you receive usually, be cautious.

• Remember, most mail carriers (USPS, UPS, FEDEX etc) usually deliver mail at the same time and leaves it at the same spot every day. If you find a piece of mail in a different place, it could be left by somebody else.

What mail is suspicious?

Look for a combination of the following signs:

• No return address• Restrictive markings• Misspelled words• Badly typed or written

What mail is suspicious?

Look for a combination of the following signs:

• Excessive postage• Possibly mailed from foreign country• Lopsided • Rigid or bulky

What mail is suspicious?

Look for a combination of the following signs:

• Oily stains, discolorations, or crystallization on wrapper

• Protruding wires• Excessive tape or string• Rattling or other sounds • Strange odor

What mail is suspicious?

• Uneven, spongy appearance• Powder on surface• Powder on hands• Powder flies when handled

Prevention: Suspicious Packages

· Although the presence of one of these conditions does not mean, for certain, that there is a bomb in the package, check further if any of these indicators are present. Find out if the recipient is expecting the package, recognizes the return address, and if the package is the right size for the item expected. Verify the return address. If any of these items come up a "no," investigate further and alert police.

· Most importantly, DO NOT OPEN ANY SUSPICIOUS PACKAGES. Many mail bombs are triggered by the act of opening the box or envelope. Leave the package where it is, evacuate the area, and call the bomb squad.

If you receive a suspicious letter or package

What should you do?

• DO NOT OPEN • Do not move • Do not shake or bump• Place it in a plastic bag or cover the

envelope, letter, and contents.• Notify your immediate supervisor and

BISD Campus Security• Turn A/C off.• Leave the room and close the door.

• WASH your hands with in a weak bleach solution or with soap and water.

• Ensure that all persons who have touched the letter wash their hands.

• If possible, take a shower. • List all people who were in the room

when this suspicious letter or package was recognized.

• Keep this group together until Security or police arrive.

If you receive a suspicious letter or package

What should you do?

The Reality of Bombs

• Bombings are very rare. In the last three years, there were only 65 incidents where an actual explosive device was placed in a school (excluding colleges and universities).

• However, from 1993-1997, juveniles were responsible for 34% of the bombings in the United States. In some states, the percentage is as high as 66%. 87% of the devices that juveniles build function, which is 6% higher than the national average of 81% for all bombs placed on a target. Juveniles have built sophisticated devices, some even using high explosives.

• We must investigate and respond to every bomb threat we receive.

• To respond properly and consistently, we have created a bomb threat response plan. This presentation will explain our plan.

The Reality of Bombs

• Even though bomb threats may be frightening, we must remain calm and professional. Our first priority is to safeguard students and staff. We must stick to the protocol to ensure that panic does not occur.

• We must also take measures to prevent bomb threats.

How Bomb Threats Can Be Communicated

• Phoned• Written• E-mailed• Verbal• Rumor

Let’s look at the threat reception protocol for each method of communication.

Phoned Threats

Remember these essential steps:• Start recording device.• Signal another staff member to listen, if possible.• Transcribe the threat.

• Fill out as much of the Phoned Threat Data Sheet as possible, including detailed questions.

• Notify the Site Decision Maker of the threat.• Complete any unanswered questions on the Phoned Threat Data

Sheet.• Be available after the call for the school's Bomb Threat Response

Team and law enforcement to interview you.

Written Threats

Remember these essential steps:• Handle the item as little as possible.• On a separate piece of paper, re-write the threat exactly as it

reads. On this copy, also record: · Where the item was found· The date and time you found the item· Any situations or conditions surrounding the discovery· Any other person you are aware of who saw the threat

Secure the original item. If small, place in a bag or envelope. DO NOT

• fold, crumple, tear, or mark the item in any way. If on a large object, secure the location.

• Notify the Site Decision Maker of the threat.

E-Mailed Threats

Remember these essential steps:• Leave the e-mail message open on the computer.• Notify the Site Decision Maker and the [title of the

computer supervisor at your school], [name of the computer supervisor at your school] , of the threat

• Print, photograph, or copy down the message. Include the header of the e-mail.

• Save the e-mail.• Leave the e-mail open until assistance arrives.

Verbal Threats

Remember these essential steps:• Detain the person making the threat, if possible and practical.• If the person who made the threat leaves, note which direction they are going.

If possible and safe, follow them at a discreet distance. Have another staff member notify the Site Decision Maker.

• Note the description of the person who made the threat: – Name, if you know them– Race– Sex– Type and color of clothing– Body size– Hair color– Distinguishing features

· Write down the threat exactly as it was communicated to you:· Exact wording· Who made the threat· The date and time of the threat· Where the person who made the threat is now

• Notify the Site Decision Maker, if someone else has not already done so.

Rumors

• If you overhear a rumor about a bomb or explosive device threat or incident, write down exactly what you heard, from whom you heard it, and then report the rumor to the Site Decision Maker.

Prevention

• To combat bomb threats, we have implemented a two-part prevention initiative:– Improve the physical security of the school– Improve relations between students, faculty,

and administration.

• It is especially important that we listen to students and make students feel comfortable coming forward with information.

• As part of our incident prevention effort, all staff must be alert for suspicious items.

• School staff know what belongs in our building and what doesn’t. If you see an item that you feel does not belong or makes you suspicious in any way:– DO NOT TOUCH IT.– If possible, secure the area (such as locking the

door to the room where the item is).– Notify the Site Decision Maker.

Prevention: Suspicious Items

top related