CONCEPT of OPERATIONS
Although the greatest majority of these type incidents across the nation are hoaxes or false alarms, all threats or suspicious packages must be treated as a real threat until proven otherwise.
All GSWSA employees should remain alert and aware of their surroundings. Question packages, mail, or any other items that seem to be out-of-place or suspicious.
-
EMERGENCY PROCEDURES
THREAT of a HARMFUL DEVICE
Refer to Action Forms 18, Bomb Threat Report form for documenting the threat.
Try to get as much information as possible: Where is the device? Why was it put here? When will it activate? Etc.
Write down exactly what the person says. Take note of speech patterns, accents, background noises, etc.
Report the threat immediately to Safety Manager, the Supervisor, the Division Chief, and the CEO.
If the above persons cannot be immediately contacted, initiate an evacuation by announcing “Code 89” over the intercom 3 times, then call 911 (preferably from a cell phone while evacuating).
All personnel hearing the Bomb Threat evacuation signal should visually scan their areas for anything out of the ordinary, then promptly evacuate in accordance with the Evacuation Plan in Appendix 12.
FOUND a SUSPICIOUS PACKAGE or MAIL
If a package appears suspicious for any reason, DO NOT OPEN IT.
Report the package immediately to Safety Manager and the department supervisor.
Depending on the specific circumstances, efforts may be made to authenticate the package before implementing emergency procedures. Is the recipient expecting the package? Can the sender be identified and contacted to verify the contents? Is this consistent with other packages routinely received? (If possible, the immediate area around the package should be evacuated and isolated during this process.)
If the package cannot be authenticated, or there is strong reason to believe it is a harmful package, initiate an evacuation by announcing “Code 89” over the intercom 3 times, then call 911 (preferably from a cell phone while evacuating).
NOTE: Not every suspicious package will require a full evacuation of the entire facility. For suspected chemical or biological agents, only the immediate area of the package will need to be evacuated and isolated.
SUSPICIOUS MATERIALS FOUND AFTER OPENING A PACKAGE
Most importantly – STAY CALM. Even if it should happen to be a harmful material, which is highly unlikely, following the correct procedures will significantly minimize the chances of anyone being harmed in any way.
As soon as the suspicious materials are discovered, gently put the package down, isolate the area if possible (close the door), move a safe distance away, and alert others of the situation.
If the package contains a suspected chemical or biological hazard, for example, a powdery substance, then try to gently cover the package with something to prevent the materials from becoming airborne. Isolate the area, alert others, and wash hands thoroughly with soap and water.
Report the incident immediately to Safety Manager and the department supervisor.
Depending on the specific circumstances, efforts may be made to authenticate the package before implementing emergency procedures. Is the recipient expecting the package? Can the sender be identified and contacted to verify the contents? Is this consistent with other packages routinely received? (The immediate area around the package should remain isolated during this process.)
If the package cannot be authenticated, or there is strong reason to believe it is a harmful package, initiate an appropriate evacuation and call 911.
NOTE: Not every suspicious package will require a full evacuation of the entire facility. For suspected chemical or biological agents, only the immediate area of the package will need to be evacuated and isolated.
-
FOLLOW-UP
Safety Manager shall investigate all bomb threat / suspicious package incidents, and shall properly document and follow-up on all findings and resulting corrective actions and/or recommendations.
Physical Assault / Violence
-
SITUATION
GSWSA employees are susceptible to the threat of physical violence or assault, which falls under the general heading of “Violence in the Workplace.”
-
THREAT or HAZARD INFORMATION
Workplace Violence is the second leading cause of total deaths in the workplace. It is the leading cause of death for women in the workplace.
A large number of these deaths occur during the course of criminal acts such as armed robbery. (Refer to ESG-20, Armed Robbery.)
Physical violence in the workplace can come from a large number of sources, including but not limited to:
-
other employees
-
former employees
-
family or friends of employees
-
customers
-
sales or delivery persons
-
complete strangers / outsiders
-
CONCEPT of OPERATIONS
This Guideline applies to physical violence incidents that are imminent, in progress, or have already occurred. For detailed procedures and requirements regarding other forms of “Violence in the Workplace”, refer to the GSWSA Safety Manual.
GSWSA employees involved in a confrontation or altercation that seems to be getting out of control should make every reasonable attempt to defuse or de-escalate the situation.
-
EMERGENCY PROCEDURES
Notify the Human Resources Manager.
If necessary or appropriate, call 911 to notify the police.
If the area is not safe, or if others are potentially threatened by the incident, alert everyone in the area and attempt to move to a safe location.
If the incident results in injuries, refer to the Emergency Procedures in ESG-5, Multiple Employees Injured. Even if there is only one employee injured, many of these procedures will still apply and can provide helpful guidance.
-
FOLLOW-UP
The Human Resources Manager shall investigate all physical assault / violence incidents, and shall properly document and follow-up on all findings and resulting corrective actions and/or recommendations
Armed Robbery
-
SITUATION
GSWSA employees are susceptible to the threat of armed robbery, which falls under the general heading of “Violence in the Workplace.”
The Billing and Collections Teller area, in particular, could appear to be an attractive target to a would-be robbery.
-
THREAT or HAZARD INFORMATION
Workplace Violence is the second leading cause of total deaths in the workplace. It is the leading cause of death for women in the workplace.
A large number of these deaths occur during the course of criminal acts such as armed robbery.
-
CONCEPT of OPERATIONS
GSWSA has a number of “Panic Alarms” in various locations in the Administrative Center. Any one of these alarms, activated during a robbery, would initiate a police response.
-
EMERGENCY RESPONSIBILITIES
Don’t be a hero; give the robber what he wants. Do not argue or resist.
Concentrate on remaining as calm as possible. Make no sudden moves; explain what you are going to do before you make any movements.
Try to take a mental snapshot of the robber. Focus on clothing type and color, weapon type, any physical features, speech patterns, etc.
If it can be done discreetly without the robber seeing, activate the silent alarm.
As the robber leaves, try to get a vehicle description and direction of travel.
Have someone immediately telephone the police with this information.
As soon possible after the robber is out of the building, lock both sets of front doors.
Notify Safety Manager, the department supervisor, the Division Chief, and the CEO.
Everyone involved or witnessing the robbery should immediately find a place to be alone, and write down anything and everything you can remember about the event and the robber. DO NOT discuss the incident or compare notes with anyone until after the police have conducted their interviews. Things other people say may influence your recollection of the incident.
Activate ISF-3, Emergency Communications.
Consider the emotional trauma of all those affected. GSWSA’s Employee Assistance Program (EAP) may be one resource, but if more immediate assistance is needed, the police and/or EMS may be able to activate other resources.
-
FOLLOW-UP
Safety Manager shall coordinate and follow-up with law enforcement regarding all armed robbery incidents, and shall properly document and follow-up on all findings and resulting corrective actions and/or recommendations.
Terrorist Attack
-
SITUATION
Water and wastewater utilities are considered by the federal government to be one of the nation’s “critical infrastructures”, which also makes them a potential terrorist target.
While it is believed to be highly unlikely, it is possible that GSWSA could be the target of a terrorist attack.
While it is believed to be highly unlikely, if a true terrorist organization chooses to target GSWSA, there is little that could be done to stop them.
-
THREAT or HAZARD INFORMATION
The worst-case scenario for a terrorist attack involving GSWSA would be a successful contamination of our water Distribution System. While this is possible, it would be extremely difficult to accomplish, for a variety of reasons.
Terrorists could have many potential alternatives to a full water system contamination. The possibilities are almost endless, but some potential options might include: contaminating one portion of our water system; causing physical damage or destruction to one or more water treatment facilities; interrupting power to our facilities; causing physical damage or destruction to one or more wastewater collection or treatment facilities; disrupting our SCADA / telemetry systems; disrupting our computer system; causing physical damage or destruction to our Operations or Administrative Centers; attacking our employees; intentionally causing a chlorine release; etc.
-
CONCEPT of OPERATIONS
GSWSA has conducted a comprehensive security Vulnerability Analysis (VA) of all our facilities and operations. The VA results and associated report are maintained under separate cover and are under very tight security restrictions.
The findings and recommendations of that report are being addressed, in part through updates and revisions to this plan that improve our emergency response procedures and capabilities, and also through a “Security” Capital Improvement Project (CIP) that deals with physical security improvements.
Given the assumption that a true terrorist organization would have the resources to carry out a planned attack despite any preventive measures we could realistically implement, GSWSA has chosen to focus our efforts primarily on early detection and rapid, effective response to the effects of the attack.
In the event of ANY terrorist activity targeting or involving GSWSA, full activation and implementation of our emergency plans will be required, as will close coordination with local, County, State, and Federal resources.
-
EMERGENCY RESPONSIBILITIES
Response activities and operations should focus on the specific effects, or impact of the attack, rather than the source of the attack.
-
For injured employees, refer to ESG-5.
-
For fatalities involving employees, refer to ESG-6.
-
For disruption to power supplies, refer to ESG-7.
-
For disruption to telephone service, refer to ESG-8.
-
For disruption of SCADA systems, refer to ESG-9.
-
For disruption of IS / IT systems, refer to ESG-10.
-
For water system contamination, refer to ESG-13.
-
For an intentional hazardous material release, refer to ESG-14.
-
For a fire or explosion, refer to ESG-17.
-
For a bomb or suspicious package, refer to ESG-18.
-
FOLLOW-UP
Safety Manager shall work closely with law enforcement regarding all terrorism incidents, and shall properly document and follow-up on all findings and resulting corrective actions and/or recommendations.
-
ACTION FORMS
-
Hurricane
ACTION FORMS TO BE DEVELOPED
-
Tornado
ACTION FORMS TO BE DEVELOPED
-
Earthquake
ACTION FORMS TO BE DEVELOPED
-
Severe Thunderstorm
ACTION FORMS TO BE DEVELOPED
-
Multiple Employees Injured
ACTION FORMS TO BE DEVELOPED
-
Employee Fatality
ACTION FORMS TO BE DEVELOPED
-
Power Outage
ACTION FORMS TO BE DEVELOPED
-
Telephone System Failure
ACTION FORMS TO BE DEVELOPED
-
SCADA Failure / Cyber Attack
ACTION FORMS TO BE DEVELOPED
-
MIS Failure / Cyber Attack
ACTION FORMS TO BE DEVELOPED
-
Major Water Main Leak / Break
ACTION FORMS TO BE DEVELOPED
-
Water System Pressure Loss
CALCULATING STORAGE RATE OF DECLINE
|
Maximum Storage Capacity = 9.8 Million Gallons (MG)
“Critical” Storage Level = 30% = 2.94 MG
|
DATE _________________ TIME ____________ am / pm
CURRENT % ___________ CURRENT GALLONS _____________________
|
PREVIOUS Storage Level: Level: ________% Time: _______ am / pm
CURRENT Storage Level: Level: ________% Time: _______ am / pm
DIFFERENCE: (subtract) ________% _______ minutes
Convert “Difference” % to gallons:
9.8MG X “Difference” _______% = _________MG X 1,000,000 = _________________ gallons
Calculate Rate of Decline:
_________________ “Difference” gallons / ______ “Difference” minutes = ___________ GPM
Gallons Remaining Before Reaching “Critical” Level:
Current Storage _________________ gallons – 2,940,000 “critical” storage capacity
= _________________ gallons until “critical”
Time Remaining Before Reaching “Critical” Level:
_________________ gallons until “critical” / Rate of Decline _______________ GPM
= ___________ minutes until “critical” / 60 min/hour
= ___________ hours until reaching “critical” level at current pumping rates
|
Report By:
|
-
Water System Contamination
ACTION FORM TO BE DEVELOPED
-
Loss of Raw Water Supply
ACTION FORMS TO BE DEVELOPED
-
Hazardous Materials Release
ACTION FORMS TO BE DEVELOPED
-
Confined Space Emergency
ACTION FORMS TO BE DEVELOPED
-
Trench / Excavation Collapse
ACTION FORMS TO BE DEVELOPED
-
Fire / Explosion
ACTION FORMS TO BE DEVELOPED
-
Bomb Threat / Suspicious Package
BOMB THREAT REPORT
|
Date:
|
Time Received:
|
Time Ended:
|
Received on Number / Line: Caller ID displayed:
|
Call was taken on the phone located:
|
GET SOMEONE’S ATTENTION IF YOU CAN – HAVE THEM GET ON THE LINE TOO
|
EXACT WORDS USED BY CALLER
|
|
|
|
|
QUESTIONS TO ASK
|
WHEN will it explode?
|
Did you place the bomb yourself?
|
WHERE is it?
|
WHY did you put it here?
|
WHAT will make it explode?
|
What is your name?
|
What does it look like?
|
Where are you right now?
|
Did you know there are a lot of people here?
|
CHARACTERISTICS
|
Caller
Male
Female
Adult
Juvenile
Child
~Age:_____
Other:
|
Voice
Loud
Soft
Deep
High
Raspy
Pleasant
Other:
|
Accent
None
Local
Foreign
__________
Slight
Moderate
Heavy
Other:
|
Speech
Fast
Slow
Clear
Distorted
Mumbled
Stuttered
Lisp
Other:
|
Language
Excellent
Good
Fair
Poor
Foul
Other:
|
Manner
Calm
Angry
Emotional
Rational
Irrational
Righteous
Laughing
Other:
|
Background
Traffic
Voices
Music
Planes
Office
Noisy
Quiet
Other:
|
ADDITIONAL INFORMATION:
|
|
|
|
NAME:
|
-
Physical Assault / Violence
ACTION FORMS TO BE DEVELOPED
-
Armed Robbery
ACTION FORMS TO BE DEVELOPED
APPENDIX
-
GSWSA Organization & System Information
-
System Description
GENERAL INFORMATION
|
Service Area
|
See service area map – figure 1
|
Board Members
|
9 Members appointed by Governor
|
Employees (2011)
|
283
|
Customers
|
75,000
|
|
|
|
WATER INFORMATION
|
Water Source and Capacity
|
Pee Dee River (Bull Creek), Intercoastal, Wells
|
Water Treatment and Capacity
|
|
Average Daily Water Production
|
|
Total Storage Tank Capacity
|
|
Water Lines in System
|
|
Fire Hydrants in System
|
|
WASTEWATER INFORMATION
|
Wastewater Treatment and Capacity
|
|
Wastewater Lines in System
|
|
Wastewater Pump Stations
|
|
BACKGROUND & HISTORY
|
|
|
|
|
mg = million gallons mgd = million gallons per day
-
Share with your friends: |