My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
True North Consulting Group LLC 8/26/2024
>
Contracts
>
Agreement
>
Professional Services (PSA)
>
True North Consulting Group LLC 8/26/2024
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/28/2024 1:42:48 PM
Creation date
8/28/2024 1:38:31 PM
Metadata
Fields
Template:
Contracts
Contractor's Name
True North Consulting Group LLC
Approval Date
8/26/2024
End Date
8/31/2026
Department
Procurement
Department Project Manager
Theresa Bauccio-Teschlog
Subject / Project Title
Everett Transit Security Threat Assessment
Tracking Number
0004488
Total Compensation
$108,075.00
Contract Type
Agreement
Contract Subtype
Professional Services (PSA)
Retention Period
6 Years Then Destroy
Imported from EPIC
No
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
187
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Download electronic document
View images
View plain text
<br /> <br /> <br />sales@tncg.com CONSULTING MADE PERSONAL PAGE 42 OF 57 <br /> <br />Security Protocols <br />Any complete protocol covers general guidelines and instructions, <br />standard operating procedures, and location-specific, customized <br />instructions that connect the security operations with the day-to-day <br />functionality of the business or facility. The set of security protocols is <br />organized into two main categories: <br />1. Procedures for ongoing (routine) operations <br />2. Procedures for emergency situations <br />The protocols listed below are typically included in each of these two <br />categories: <br />1. On-going Security Procedures may include the following (if <br />applicable): <br />• Location opening <br />• Location closing <br />• Access control <br />• Guests and visitors <br />• Interior/exterior <br />review of the facility <br />• Search procedures <br />• Handling mail and <br />deliveries <br />• Arrival and departure of <br />congregants/students/staff <br />• Entering the facility after <br />hours <br />• Hiring of new employees <br />• Security roles and <br />responsibilities <br />• Other relevant protocols <br />2. Emergency Security Procedures may include the following (Site <br />Level): <br />• Alarm activation <br />• Detection of a <br />suspicious person <br />• Detection of a <br />suspicious object <br />• Detection of a <br />suspicious vehicle <br />• Detection of a weapon <br />• Detection of an explosive <br />device <br />• Handling bomb threat <br />• Attack on the facility or its <br />occupants <br />• Fire in the facility <br />• Evacuation <br />• Other relevant protocols
The URL can be used to link to this page
Your browser does not support the video tag.