Question Title

Image

Question Title

* 1. Contact Information

Question Title

* 2. Are you aware of any terrorist threats or history of threats to your organisation, your area, or your specialty?

Question Title

* 3. Is the location of your organisation symbolic - historical, iconic, religious, cultural or political?

Question Title

* 4. Does your location attract a large number of people at any one time?

Question Title

* 5. Is the density of people at your location high?

When determining density of people at your location consider: Is the location attended by a large number of people, is the area small with limited entry and exit points?

Question Title

* 6. Do people gather at the location on a predictable basis?

Predictability of people gathering at a location can be assessed in several ways, including:  
  • Location’s history and tradition
  • Publicly available programs and schedules
  • Advertising by owners and operators
  • Online and social media presences

Question Title

* 7. If the location was interrupted in its function would it have a significant economic impact upon the nation, state or territory?

The following three broad areas should be considered when assessing the economic impact of a terrorist attack on site:
  • Consumer confidence (visitations)
  • Business activity (consumption and investment)
  • Employment (full-time employees)

Question Title

* 8. Security Environment and Overall Vulnerability to Attack

Things to consider when determining if current physical and technical security leaves your organisation vulnerable to a terrorist attack:
  • Does your organisation have effective internal security procedures?
  • What is law enforcement presence in your area?
  • How accessible is your facility (security presence, access control, ID badges, metal detection, buffer zones, fences, etc)?
  • Do you have access control to your parking area and do you conduct vehicle searches when entering facility grounds or parking areas?
  • Do you employ detection/monitoring systems, such as CCTV, intrusion detection systems, etc? Is the technology current?
  • What level of public access is necessary for you to function?

Question Title

* 9. Policy/Procedures/Plans

When determining if current policies/procedures/plans leave your organisation vulnerable, many factors should be considered:
  • Do you have a current crisis response/disaster plan?
  • Does your plan include the types of crises you are most likely to encounter, such as fire, explosion, chemical release?
  • Are your employees familiar with the plan?
  • Have you conducted crisis response and disaster drills and were they effective?
  • Have you identified the critical functions of your workplace and do you have a plan for continuation of operation during an emergency?

Question Title

* 10. Computer Security – attacks against your organisation’s computers systems and your data. 

Consider some of the below factors when determining your organisation’s cyber security vulnerability:
  • Is your site dependent on information technology such as computers and networks to accomplish its daily business activities?
  • Is the information stored in your computer systems valuable?
  • Do you have back-up power available for your computer systems?
  • Do you make back-up copies of your data?
  • Is your back-up data securely store?
  • Are your computers or networks connected to the internet?
  • Have you experienced problems with computer security incidents in the past?
  • Do you have staff who are adequately trained and are available to monitor security warning and take protective measures?
  • Do you have technology security tools in place such as firewalls, intrusion detection systems or anti-virus software to protect your computer systems?
  • Do you have a computer security policy, plan and procedure in place that includes a computer security incident response team?

Question Title

* 11. Handling of Suspicious Mail and/or Packages

Things to consider when ascertaining the vulnerability of your organisation’s procedures for handling suspicious mail and/or packages:
  • Is the mail for your facility opened in a secured area of an area isolated from the majority of personnel?
  • Have the personnel who open mail received training on the recognition of suspicious mail and/or packages?
  • Do you have specific procedures on how to handle suspicious mail, including possible facility evacuation?
  • Do you have a secure and contained location where any unusual or suspect deliveries or mail can be stored until proper authorities can evaluate the suspect items?

T