Laserfiche WebLink
<br /> <br /> <br />sales@tncg.com CONSULTING MADE PERSONAL PAGE 42 OF 57 <br /> <br />Security Protocols <br />Any complete protocol covers general guidelines and instructions, <br />standard operating procedures, and location-specific, customized <br />instructions that connect the security operations with the day-to-day <br />functionality of the business or facility. The set of security protocols is <br />organized into two main categories: <br />1. Procedures for ongoing (routine) operations <br />2. Procedures for emergency situations <br />The protocols listed below are typically included in each of these two <br />categories: <br />1. On-going Security Procedures may include the following (if <br />applicable): <br />• Location opening <br />• Location closing <br />• Access control <br />• Guests and visitors <br />• Interior/exterior <br />review of the facility <br />• Search procedures <br />• Handling mail and <br />deliveries <br />• Arrival and departure of <br />congregants/students/staff <br />• Entering the facility after <br />hours <br />• Hiring of new employees <br />• Security roles and <br />responsibilities <br />• Other relevant protocols <br />2. Emergency Security Procedures may include the following (Site <br />Level): <br />• Alarm activation <br />• Detection of a <br />suspicious person <br />• Detection of a <br />suspicious object <br />• Detection of a <br />suspicious vehicle <br />• Detection of a weapon <br />• Detection of an explosive <br />device <br />• Handling bomb threat <br />• Attack on the facility or its <br />occupants <br />• Fire in the facility <br />• Evacuation <br />• Other relevant protocols