Question Title OK Question Title * 1. Contact Information Name Company Email Address OK Question Title * 2. Are you aware of any terrorist threats or history of threats to your organisation, your area, or your specialty? Extremely aware Very aware Somewhat aware Not so aware Not at all aware OK Question Title * 3. Is the location of your organisation symbolic - historical, iconic, religious, cultural or political? Strongly symbolic Mildly symbolic Not at all symbolic OK Question Title * 4. Does your location attract a large number of people at any one time? A great deal A lot A moderate amount A little None at all OK Question Title * 5. Is the density of people at your location high?When determining density of people at your location consider: Is the location attended by a large number of people, is the area small with limited entry and exit points? Very high High A moderate amount A little None at all OK Question Title * 6. Do people gather at the location on a predictable basis?Predictability of people gathering at a location can be assessed in several ways, including: Location’s history and tradition Publicly available programs and schedules Advertising by owners and operators Online and social media presences Extremely predictable Moderately predictable Not at all predictable OK Question Title * 7. If the location was interrupted in its function would it have a significant economic impact upon the nation, state or territory?The following three broad areas should be considered when assessing the economic impact of a terrorist attack on site: Consumer confidence (visitations) Business activity (consumption and investment) Employment (full-time employees) Significant impact Moderate impact Minimal impact OK Question Title * 8. Security Environment and Overall Vulnerability to AttackThings to consider when determining if current physical and technical security leaves your organisation vulnerable to a terrorist attack: Does your organisation have effective internal security procedures? What is law enforcement presence in your area? How accessible is your facility (security presence, access control, ID badges, metal detection, buffer zones, fences, etc)? Do you have access control to your parking area and do you conduct vehicle searches when entering facility grounds or parking areas? Do you employ detection/monitoring systems, such as CCTV, intrusion detection systems, etc? Is the technology current? What level of public access is necessary for you to function? High vulnerability Moderate vulnerability Low vulnerability OK Question Title * 9. Policy/Procedures/PlansWhen determining if current policies/procedures/plans leave your organisation vulnerable, many factors should be considered: Do you have a current crisis response/disaster plan? Does your plan include the types of crises you are most likely to encounter, such as fire, explosion, chemical release? Are your employees familiar with the plan? Have you conducted crisis response and disaster drills and were they effective? Have you identified the critical functions of your workplace and do you have a plan for continuation of operation during an emergency? High vulnerability Moderate vulnerability Low vulnerability OK Question Title * 10. Computer Security – attacks against your organisation’s computers systems and your data. Consider some of the below factors when determining your organisation’s cyber security vulnerability: Is your site dependent on information technology such as computers and networks to accomplish its daily business activities? Is the information stored in your computer systems valuable? Do you have back-up power available for your computer systems? Do you make back-up copies of your data? Is your back-up data securely store? Are your computers or networks connected to the internet? Have you experienced problems with computer security incidents in the past? Do you have staff who are adequately trained and are available to monitor security warning and take protective measures? Do you have technology security tools in place such as firewalls, intrusion detection systems or anti-virus software to protect your computer systems? Do you have a computer security policy, plan and procedure in place that includes a computer security incident response team? High vulnerability Moderate vulnerability Low vulnerability OK Question Title * 11. Handling of Suspicious Mail and/or PackagesThings to consider when ascertaining the vulnerability of your organisation’s procedures for handling suspicious mail and/or packages: Is the mail for your facility opened in a secured area of an area isolated from the majority of personnel? Have the personnel who open mail received training on the recognition of suspicious mail and/or packages? Do you have specific procedures on how to handle suspicious mail, including possible facility evacuation? Do you have a secure and contained location where any unusual or suspect deliveries or mail can be stored until proper authorities can evaluate the suspect items? High vulnerability Moderate vulnerability Low vulnerability OK DONE