top of page
ค้นหา
tdteam

15. Threats And Sabotage

อัปเดตเมื่อ 16 ก.ย. 2562

Threats and sabotage disrupt operations and create panic if managed poorly. Threats are delivered by mail, e-mail, and telephone.


Mail/ Postal

Potential signs of a postal threat/ device

  • Grease marks on the package

  • Odours

  • Wires or metal foil

  • Package excessively wrapped

  • Incorrectly addressed

If you think you are handling asuspicious package:

  1. Put the item on a flat stable surface

  2. Do not try to cover the package

  3. Mark the item for recognition by authorities

  4. Evacuate the immediate area

  5. Remain at least 100m from the package

  6. Notify the authorities


Telephone

  1. Glean as much information regarding the device as possible, including location, time ofexplosion and motivation.

  2. Note the exact wording of the message (if possible), making note of the date and time.

  3. Deduce characteristics of the caller including male/ female, accented, background noise, old/young, etc.

  4. Alert the emergency response team and authorities.

  5. Evacuate to the secondary evacuation point.

The telephone bomb threat ‘tick-sheet’ provides prompts for questions and detail; and should be available to telephone operators.


Email

The prevalence of e-mail threats is increasing given the anonymity and ease of threat delivery. The process to adopt when dealing with an e-mail threat:

  1. Notify Asia Pacific Risk Management or CR24.

  2. Do not forward or reply to the message unless directed to do so.

Sabotage is another credible cause of widespread panic and disruption. Sabotage includes contamination offood and beverage; airborne chemicalsand agents; and contamination of watersources. The two categories of sabotage include biological andchemical threat.


Biological agents are germs that causedisease (anthrax, smallpox) and are infectious, whereas chemical agents are not infectious. The process to adopt in both instances is:

  1. Evacuate the area

  2. Alert authorities

  3. Identify yourself to authorities

  4. Do not leave the hotel unless directed to do so

  5. Avoid contact with guests or staff that were not exposed to the area

The key priorities are to:

  • Protect life

  • Identify the threat

  • Control the incident

  • Contain those involved

  • Contact the authorities

The Asia Pacific Risk Management team are available to assist

โพสต์ล่าสุด

ดูทั้งหมด

20. Workstation Security

Target Audience: All employees who use hotel workstations, Front Desk employees, General Managers, IT Managers Training Tip: Ask the...

6. Fire Extinguishers

In addition to knowing what your responsibilities are in an emergency, you should also know where your fire fighting equipment is located...

18. Fire Extinguishers And Fuels

In addition to knowing what your responsibilities are in an emergency you should also know where your fire fighting equipment is located...

Comments


bottom of page